The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study examines e-Collaboration processes within temporary and ongoing virtual team by analyzing the level gaps of these processes according to the virtual team type. A quantitative test was carried out to compare the means gaps between the two virtual team types in five common collaboration processes. Then, employing a qualitative analysis, we constructed a conceptual model to understand the...
As the system is deployed in the dynamic environments, the need of self-adaptive system is increasing. In addition, by advancing the network technology, self-adaptive system interacts with other systems to achieve the complex goals, which are difficult to be achieved by single self-adaptive system. During the interaction, they may share security-critical information. As a result, security becomes...
Trust is one of the major factors that a system needs to achieve the secure interaction. Trust can represent the social and reliability perspective of the security. This characteristic makes trust the soft security factor. There are some attempts to evaluate trust, however, they do not consider the characteristics of self-adaptive systems such as self-* properties, openness, and uncertainty. In this...
The Internet of Things (IoT) is producing a tidal wave of data, much of it originating at the network edge, from applications with requirements unmet by the traditional back-end Cloud architecture. To address the disruption caused by the overabundance of data, this paper offers a holistic data-centric architectural vision for the data-centric IoT. It advocates that we rethink our approach to the design...
This paper studies the performance of two different trust models in a vehicular network scenario. Like all networks, messages in Vehicular Ad hoc Networks (VANETs) are prone to malicious tampering. Tampered messages render these networks useless for active safety applications. That is why trust models have been proposed in addition to the available authentication mechanisms. Identifying the most suitable...
Packet integrity or modification attacks commonly happen in Opportunistic Networks (OppNets). In this paper, we propose a technique that uses Merkle trees to protect the integrity of the packets transferred in a network. When adopting the technique in an OppNet, nodes will be able to verify that data transferred from node to node is received unchanged and in its original state. Using a solid trust...
Association rule mining from the large transactional database is one of the interesting and challenging paradigms in knowledge discovery. An objective measure is a key tool for the measurement of interestingness in between two patterns. Association rules extracted using traditional objective measures may have high dissociation which is by nature opposite of association. Dissociation in between two...
Vibrotactile display has been investigated to support driver's monitoring of traffic situation when auto driving. A vibrotactile display was assumed to contribute to driver trust in automation since driver can know the spatial awareness of an automated system to predict or understand the action selection for driving. The display provided the spatial information of close traffic objects with haptic...
Adhoc wireless networks are defined as the category of wireless networks that utilize multihop radio relaying and are capable of operating without the support of any fixed infrastructure and hence they are also called infrastructureless networks. This type of network allows for spontaneous communication without previous planning between mobile devices. A variety of routing protocols for adhoc wireless...
Reputation-based methods have been widely proposed and practised to foster online trust relationships. Previous works introduced the concept of reputation utility that bridges reputation and trust to reveal the reciprocal transformation mechanism between them. In this paper, an improved model, concerning the popularity of online entities, is constructed. Based on the model, further exploration on...
In knowledge representation reification, N-Quads and Named Graph have been introduced to represent context of knowledge, meta-information, provenance or any statements of statement. In this work we propose an attributed predicate RDF as a new alternative model in triple RDF to overcome the problem to represent statements of statement or any additional information of statement. We study that the predicate...
In typical settings for Wireless Sensor Networks (WSNs), a potentially large set of nodes operates under strict requirements concerning energy consumption and packet delivery success. If non-reliable or even malicious nodes participate, standard protocols can suffer in performance which may result in a limited functionality of the whole network. This paper addresses this issue by establishing end-to-end...
Internet of Things (IoT) technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in our personal life by means of smart devices at home. Such devices often interconnect with cloud services that promise easy usage and global access. However, managing the balance between trust in the service provider and need for privacy of individuals becomes a major challenge...
Devising a protocol for computing the location of a sensor in a wireless sensor network (WSN) is a challenging task. In this paper, we present a protocol for computing the location of a sensor that is part of a WSN. The proposed protocol is based on the extent of the trust contained in the reply messages sent by the neighboring sensors that are either anchors or already localized nodes against the...
This work assesses the relationship between common theoretical constructs involved in simulation design and evaluation. Specifically, the degree to which realism is a desired goal in design is examined through a thorough review of the available literature. It was found that, especially for training simulations, high fidelity does not always beget improved outcomes, and this finding was corroborated...
In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. Due to autonomy of peers and open environment, security is big issue in P2P computing systems. Traditional security mechanisms used in centralized systems are not suited for P2P computing systems because there is no central point of authority. The working of a P2P computing...
Security of sensitive data in the network is a key issue in a world where such sensitive data can easily be transferred between different servers and locations (e.g., in networked clouds). In this context, there is a particular need to control the path followed by the data when they move across the cloud (e.g., to avoid crossing -even encrypted- un-trusted nodes or areas). In this paper we proposed...
In open multi-agent systems, agents may hide or lie about information regarding some events. In order to avoid such deception, a multi-agent system must be designed to test the confidence of agents. In this paper, we present a new approach to agent-based confidence modeling. This approach integrates two confidence requirements, namely, trust and certainty. We use fuzzy logic in representing the importance...
Cognitive radio is a promising solution for spectrum scarcities in the future. Secondary users (SUs) adopt cooperative sensing to learn the primary user's (PU's) occupancy activity. This paper develops a trust-based data aggregation scheme to cope with malicious SU attack in cooperative spectrum sensing in cognitive radio networks. The proposed scheme combines the first-hand and second-hand sensing...
Security of sensitive data in the cloud is a critical issue as they can easily be transferred between different locations and then violate some constraints such as country-based regulations. There is notably a specific need to control the path followed by the data when they are transferred within the cloud. This paper is then presenting a new approach using OpenFlow and allowing to enforce in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.