The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has proved to be a viable model for delivering information technology services through the web. It provides users the ability to share distributed resources owned by a central service provider at minimal setup costs. However, due to its nature, existing and potential users of the cloud are more concerned about the integrity, security and privacy of their data, and also the ability...
Cloud computing is an emerging paradigm for large scale infrastructures. It has the advantage of reducing cost by sharing computing and storage resources, combined with an on-demand provisioning mechanism relying on a pay-per-use business model. These new features have a direct impact on the budgeting of IT budgeting but also affect traditional security, trust and privacy mechanisms. Many of these...
Trust plays an important role in the development, implementation and operation of e-commerce systems. This paper Analyzes the current research of e-commerce trust model and research method, proposes a formal model of e-commerce trust management based on reputation, disccusses the various issues involved and their solution ideas, which gives a good foundation for further research.
A trust model for P2P network is proposed in this thesis, namely CRM, a cluster and recommendation based multi-granularity trust model. Compared to the current trust model, some problems can be solved better, for instance, these disadvantages contain great costs due to iterative calculations, and security such as disguise, slandering caused by anonymous and open characteristics of P2P networks. The...
To objectively and correctly quantify the entity's trust according to the entity's behaviors is a challenge in the Grid environments. This paper proposes a behavior trust computation model based on risk evaluation to deal with this issue. In this paper, an effective system framework, which includes asset identification, threat identification and trust relationship identification, is designed. The...
An experience based trust model in migrating workflow is proposed. In the trust model, security and capability are considered in a cooperation evaluation, a cooperation evaluation sequence is updated according to update strategies and the trust degree is acquired using the trust degree formula. Self-confidence of the workplace is defined based on our former research in agent ability self-confidence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.