Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The traditional collaborative filtering algorithm is too much emphasizing on the role of similarity of the predicted value that there have a higher Sparse Data and poor result of Recommendation. In addition to similarity, the user's trust and authority are also an important factor that will affect the result of recommendation in the algorithm by analyzing. Proposing a new filtering method by introducing...
Existing access control models which are designed to preserve integrity are inadequate for distributed system. In this paper, we propose a trust aware access control model called TAAC, which extends the existing access control models with trust level. Moreover, it assigns trust level to each subject and object, and can dynamically adjust it. We partly implement TAAC model based on attestation.
In this paper, a novel access control scheme based on Bayesian trust network is developed to address to the security services in P2P environments. The trust mechanism is constructed with Bayesian network model, which could describe precise trust degree of the P2P node responding to various operation or access. The model of access control is proposes with Bayesian trust network of P2P members, and...
Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing...
Nowadays, most of access control models have been studied extensively in centralized and static environment, and they seldom meet the requirements of some dynamic collaborative environments, such as Grid, P2P and ad-hoc network. In this paper, the trust mechanism of the agents in collaborative environments is analyzed, a suitable method is introduced for calculating the agentpsilas trust in collaborative...
Proliferation of collaboration environments brings new issues to the area of security. In this paper, we briefly describe the characteristics of security associated with collaboration environments. We also discuss and analyze several schemes in different areas of security, including access control, secure group communication, and security management. Another contribution of this paper is a proposed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.