The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In multiagent interactions, such as e-commerce and file sharing, being able to accurately assess the trustworthiness of others is important for agents to protect themselves from losing utility. Focusing on rational agents in e-commerce, we prove that an agent's discount factor (time preference of utility) is a direct measure of the agent's trustworthiness for a set of reasonably general assumptions...
Website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which involves information sharing. However, the awareness about privacy concerns and security threats have caused to non-sharing behavior among the Internet Users. This situation have caused...
The emergence of the Internet has changed the nature of face-to-face towards online interactions. This leads to the concept of virtual interoperation such as Web Services, Grid, and Cloud Computing. Since existing security mechanisms are insufficient to cover the diversity of workflow application domains, trust is considered as an adaptive, high-level abstraction, and platform-independent solution...
The Internet, Web 2.0 and Social Networking technologies are enabling citizens to actively participate in “citizen science” projects by contributing data to scientific programs. However, the limited expertise of contributors can lead to poor quality or misleading data being submitted. Subsequently, the scientific community often perceive citizen science data as not worthy of being used in serious...
Being able to make objective Quality of Service (QoS) judgments or assessments is a challenging and crucial activity. The process of making these assessments is compounded when the environment in which the assessments have to be made are virtual; in the sense the interacting parties might not have necessarily met with each other physically. In a broad sense Quality of Service assessments could be...
In this paper we propose to apply an algorithm for finding out and cleaning mislabeled training sample in an adversarial learning context, in which a malicious user tries to camouflage training patterns in order to limit the classification system performance. In particular, we describe how this algorithm can be effectively applied to the problem of identifying HTTP traffic flowing through port TCP...
With the increase of the number of web services on the Internet, QoS driven service selection as an important way to satisfy user's constraint on quality and maintain the runtime performance of services, has received much attention. The existing QoS driven service selection approaches always assume that the estimated QoS data is effective and trustworthy, which is actually impossible in reality. This...
Visual spoofing in Unicode-based text is anticipated as a severe web security problem in the near future as more and more Unicode-based web documents will be used. In this paper, to detect whether a suspicious Unicode character in a word is visual spoofing or not, the context of the suspicious character is utilized by employing a Bayesian framework. Specifically, two contexts are taken into consideration:...
Personal information sharing is one of the most common online activities. Most of the times we feel forced to give up about some privacy in order to share a piece of information with others. This paper reflects on the anonymity, integrity, privacy of users' personal information and it's scattering across the Web by taking an approach to digital identity management concept. Consequently it also reflects...
Cloud federation aims to cost-effective assets and resources optimization among heterogeneous environments where clouds can cooperate together with the goal of obtaining unbounded computation resources, hence new business opportunities. This paper describes an architecture for the federation establishment, where clouds that need external resources ask to federated clouds the renting of extra physical...
The DynaSOAr framework presents a wholly service-oriented approach to grid and Internet-based computing that makes a clear and explicit separation of concerns between service-provision and resource-provision for each service invocation. The separation allows the dynamic deployment of code at runtime, in the form of a service implementation, between a service provider and an explicit resource provider...
Most software systems developed nowadays are highly complex and subject to strict time constraints, and are often deployed with critical software faults. In many cases, software faults are responsible for security vulnerabilities which are exploited by hackers. Automatic web vulnerability scanners can help to locate these vulnerabilities. Trustworthiness of the results that these tools provide is...
At present, more and more people use the Internet to transact. In order to be successful transactions, it is need to establish a certain trust relationship between people In order to manage the trust relationship, trust model have been proposed. Based on the past trust model, a Dynamic Trust Model based on Perceived Risk is given in the paper. The perceived risk is divided into six dimensions under...
In recent years Web-based systems have become extremely popular and, nowadays, they are used in critical environments such as financial, medical, and military systems. As the use of Web applications for security-critical services has increased, the number and sophistication of attacks against these applications have grown as well. For this reason it is essential to be able to prove that the target...
Lots of dishonesty actions and unreliable services flood the present applications based on Web. The paper presents an end-user trust management model for web information system by the theory of reasoned action and the technology acceptance model. In the model, the reputation of an end-user, mainly comes from other nodes' weighted trust feedback, determines whether the transaction can process or not...
Reasoning about information flow can help software engineering. Static information flow inference analysis is a technique which automatically infers information flows based on data or control dependence. It can be utilized for the purposes of general program understanding, detection of security attacks and security vulnerabilities, and type inference for security type systems. This paper proposes...
In the context of the work developed by the 4WARD project within the Future Internet, some use-cases were created to show the main aspects of 4WARD's work, highlighting the technical innovations arising from the project, and also to study the related business potential. This way, four use-cases were developed: two more user oriented (Community-oriented Applications and Internet of Things) and two...
Advances in digital technology are increasing the volume of computer data and accelerating the massive integration of software into our daily lives. The widespread interconnection of networks and digital convergence accentuates this computerization process, making computing, telecommunications and audiovisual information increasingly compatible and interoperable. eGovernment services to citizens and...
While the importance of trust in the online vendor and electronic channel for e-commerce transactions is well established, less is known about factors that influence trust in e-government services. Moreover, perceptions of trust depend heavily on the cultural context and thus can vary across countries. This study investigates differences in trust and consumption of public services by citizens across...
In 2008, 90 million citizens in the United States used electronic tax filing to submit their federal tax returns. Yet these adopters represent only a subset of the population. Citizen concerns regarding the security of this electronic option still serve as a barrier to e-file adoption. In this study, we propose a model of e-file adoption that integrates technology acceptance, optimism bias, reputation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.