The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust relationships are subjective and dynamic. One entity's trust over a subject is completely independent of some other entity's trust: trust is subjective. Trust also evolves dynamically over time. The growth of cloud computing over the last few years has created an environment where clients need to transact with cloud service providers even though the cloud service clients may or may not completely...
Vehicular Ad-hoc Network (VANET) is a sub disciple of Mobile Ad-Hoc Networks. VANET provides wireless communication among vehicles and vehicle to road side equipments. The communication between vehicles is used for safety, comfort and entertainment (convenience). The performance of communication depends on how better the routing takes place in the network. Routing of data depends on the routing protocols...
Phishing is a type of electronic identity theft in which a combination of social engineering and website spoofing techniques is used to deceive a user into giving away confidential information with economic value. Phishing has flourished exponentially together with the expansion of the Internet. This flourish and the development of technology has not only benefitted Internet users, but also has enabled...
The idea of social participatory sensing provides a substrate to benefit from friendship relations in recruiting a critical mass of participants willing to attend in a sensing campaign. However, the selection of suitable participants who are trustable and provide high quality contributions is challenging. In this paper, we propose a recruitment framework for social participatory sensing. Our framework...
Everyday, people upload thousand of private photos on Social Networks. Usually, these photos are available only to their social friends but, in some cases, users inadvertently allow third-party applications to access their data or, analogously, friends allow applications to access their friends' data. Hence, uploaded private pictures may also be accessed by third parties. In this paper, we introduce...
Most SCADA and industrial control systems have a limited and deterministic set of behaviors that results with a relatively small amount of variability during normal system operation. Automatic controller commands, operator commands and sensor measurement data within the system may be modified by an attacker to cause system failures. To detect these intrusions a Transfer Function based Intrusion Detection...
with the rapid development of the network, P2P technology is widely used in the Internet, P2P application is facing the trust threat of the network. This paper first describes P2P trust problem, then proposes a P2P game trust model based on an unknown node type, and describes the modeling conditions and modeling process in detail. Use the simulation tool Gambit to verify the feasibility of the proposed...
We hypothesize that information shared on social media can work for distributed software teams as a surrogate of the social awareness, that is information that a person maintains about others in a social or conversational context, gained during informal face-to-face chats. Hence, we have developed a tool that extends a collaborative development environment by aggregating content from social networks...
We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring...
Cloud computing represents today's most exciting computing paradigm shift in information technology. However, security and privacy are perceived as primary obstacles to its wide adoption. Here, the authors outline several critical security challenges and motivate further investigation of security solutions for a trustworthy public cloud environment.
Email spam is one of the social problems we face every day. Another relating crucial problem is the massive spam sent from the legitimate home computers compromised by the malware called bot. Although the schemes for identifying email senders are one of powerful arms against spam and spamming bot, the current major such schemes, such as the Domain Keys Identified Mail (DKIM), cannot identify spamming...
Reputation systems are having increasing influence on guarding P2P networks. However, reputation systems themselves are vulnerable to attack. Due to the nature of aggregating ratings, the reputation scores of certain peers can be manipulated intentionally by adversaries. In this paper, we report the discovery of a novel attack, named RepHi (Reputation Hijack), against rating-based reputation systems,...
Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data...
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational boundaries. In order to address this problem, we propose a trusted computing platform in a form of a USB device. First, we describe the design and...
This paper presents the various mechanisms for virtual machine image distribution within a large batch farm and between sites that offer cloud computing services. The work is presented within the context of the Large Hadron Collider Computing Grid (LCG), it has two main goals. First it aims at presenting the CERN specific mechanisms that have been put in place to test the pre-staging of virtual machine...
In this paper we study the problem of network exchange in trust based social networks. Network exchange is of two types: Specialized Exchange and Generalized Exchange, this can be characterized in terms of reciprocity, triads, graph motifs across these networks. Given the lack of standard metrics for Generalized Exchange, we propose a metric to quantify generalized exchange. We observe that the phenomenon...
The outsourcing of databases to third parties has become a viable alternative to traditional in-house data management. Database management by third parties including the storage and maintenance allows companies to reduce their expenses and profit from the expertise of data storage specialists. However, the price is the transfer of confidential data to third parties. The data owners need to trust the...
Peer-to-peer (P2P) computing may trigger a revolution in the near future because of its ease of use, huge choice and low price. Its chief features are anonymous, independent, dynamic, and absent of centralized server. Due to these features, on the other hand, P2P networks are often insecure and easily suffer from the malicious attacks. Besides, the peers in the system should cooperate in order for...
A Network Address Translator allows hosts in a private address space to communicate with servers in the public Internet. There is no accepted solution for an arbitrary host from the public IP network to initiate communication with a host in a private address space although attempts have been made to create one. This paper proposes the replace NATs with a more comprehensive concept we call Customer...
The paper proposes a dynamic access control model for Web services that based on the trust-authorization -WS-TABAC model. A simple evaluation algorithm about trust is defined, which can calculate the trust degree of users easily. In WS-TABAC model, part or complete privileges can be achieved through the mapping relations defined between trust and authorization. Theoretical analysis and examples demonstrate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.