The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust assessment is a fundamental concept in the context of collaboration for large scale IoT systems. How to represent and measure appropriately the trust is a pursuit of many researchers. Many tasks, such as encryption and signature, can be accomplished perfectly by a collaborative process when a trust metric is well-defined. Trust is a widely used metric that is both effective and significative...
Trust helps to make decisions in unpredictable circumstances. Every security system depends on trust, in one form or another, among users of the system. A trust management scheme can used to help an automated decision-making process for the access control strategy. Unintentional temporary errors are possible in system, the trust management solution must provide a scheme to allow nodes to recover trust...
Online communities promise a new era of flexible and dynamic collaborations. However, these features also raise new security challenges, especially regarding how trust is managed. In this paper, we focus on situations wherein communities participants collaborate with each others via software agents that take trust decisions on their behalf based on policies. Due to the open and dynamic nature of Online...
Collaborative environments raise major challenges to secure them. These challenges increase when it comes to the domain of Enterprise-Social-Networks (ESNs) as ESNs aim to incorporate the social technologies in an organization setup while asserting greater control of information security. In this context, the security challenges have taken a new shape as an ESN may not be limited to the boundaries...
Recent developments in software defined networking have shed new light on how to control and manage an ad hoc wireless network. Given the wide deployment and availability of heterogeneous wireless technologies, the control and management of ad hoc wireless networks with the new software defined networking paradigm is offered more flexibility and opportunities to deal with trust and security issues...
Video based telehealth is emerging as an important technology for effective and efficient collaboration between providers and patients. The advantages of receiving care at source not only account for convenience and cost effectiveness but also enable faster access to care. It brings access, experience and efficiencies in the care process. While there are multiple models of telehealth, in this work,...
In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. Due to autonomy of peers and open environment, security is big issue in P2P computing systems. Traditional security mechanisms used in centralized systems are not suited for P2P computing systems because there is no central point of authority. The working of a P2P computing...
This paper investigates the effectiveness of trust and reputation model (TRM) in clustering as an approach to achieve higher network performance in cognitive radio (CR) networks. Reinforcement learning (RL) based TRM has been adopted as an appropriate tool to increase the efficacy of TRM. The performance of both the traditional TRM and RL-based TRM schemes was analyzed using the probabilities of packet...
Community Cloud Computing is an emerging and promising computing model for a specific community with common concerns, such as security, compliance and jurisdiction. It utilizes the spare resources of networked computers to provide the facilities so that the community gains services from the cloud. The effective collaboration among the community clouds offers a powerful computing capacity for complex...
In this paper we present our Virtual Organization (VO) Identity Management (IdM) Model, an overview of 14 interviews that informed it, and preliminary analysis of the factors that guide VOs and Resource Providers (RPs) to choose a particular IdM implementation. This model will serve both existing and future VOs and RPs to more effectively understand and implement their IdM relationships. The Virtual...
MANET (Mobile Ad hoc NETwork) is a self organized network with nodes collaborating in order to communicate. Hence, availability of the resources in such network is fundamental. Availability concerns essentially the network nodes as well as routing and forwarding actions accessibility. Generally, nodes lifetime is consumed by legitimate traffic. It also can be shortened or even depleted by deny of...
Trust is one of the fundamental security concepts since it provides network collaborating entities with a mean to counter their uncertainty. Trust is generally integrated into existent security frameworks in order to add a security level to entities collaborations through the use of trust relations. Besides, benefiting from trust relations implies establishing them, updating them when needed and revoking...
Due to its ad hoc, infrastructure-less self-configuring and collaborating nature, wireless sensor networks (WSNs) are very much vulnerable to different security threats. The goal-oriented nature of many sensing applications results in collaboration. In fact, collaboration helps to improve WSNs efficiency as well as the data-centric behavior of WSNs. Collaboration along with its advantages like efficient...
End-to-end security in collaborative system has two inferences: the secure delivery of service and the `due usage' of it. The fulfillment of this requirement involves re-thinking the security policy model of collaborative systems. This paper analyses the factors that impact security in such systems. Based on this, a general architecture is proposed with a collaboration-based policy model specified...
Industrial adoption of cloud computing for collaborative business processes is limited by their ability to meet inter-enterprise security requirements. Although some clouds offerings comply with security standards, no solution today allows businesses to assess security compliance of applications at the business level and dynamically link to security countermeasures on-demand. In this paper, we present...
Collaborative business processes often consist of services provided by multiple business entities which agree to join a business collaboration. To enable trustworthy and secure consumption and provisioning of services across organizational boundaries, security requirements must be carefully defined so as to be coherent, consistent, and in compliance with designed business processes. However, managing...
In this paper we reinforce the benefits of a trust based approach in mobile multi-agent systems. Whilst we do not specify a trust model we provide a framework for property based trust, defining the observations which underpin many pre-existing trust models. This framework maintains subjectivity which should be the basis of any trust based system yet enables entities to communicate and collaborate...
In order to improve the robustness and accuracy of multi-domain evaluation, in response to the subjectivity of the inter-domain trust, this paper presents a target-restriction-free collaborative evaluation and decision-making algorithm based on fuzzy partial ordering relation. It also presents a mathematical model for evaluation and decision-making in the environment of multi-domain. In conclusion,...
Acknowledged as important factors for business environments operating as virtual organizations (VOs), trust and reputation are receiving attention also in Grids devoted to scientific applications where problems of finding suitable models and architectures for flexible security management of heterogeneous resources arise. Being these resources highly heterogeneous (from individual users to whole organizations...
Policy-based methods simplify the management of cross-domain collaborations by establishing policies to control various cross-domain activities involved in those collaborations. Administrators and users from participant domains can use policies to define control rules and restrictions, and to configure execution environments for these collaborations. To detect and resolve potential dynamic conflicts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.