The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
During the last years, the growth of e-commerce has been considerable due to the increase of user confidence in secure electronic payment. Most of the security proposals in commerce scenarios have been based on a classical e-payment system definition. This definition basically represents a client who sends a payment order to obtain some goods/services from the merchant. Nevertheless, these definitions...
Establishing trust in a distributed computing environment is one of the most challenging and important aspects of cluster computing. Achieving optimal performance in clusters forces the migration of processes to other nodes. This is where trust comes into play. A secure trusted environment is needed in order to ascertain the credibility of the participating nodes working together to achieve a goal...
With the development of grid computing, economy models are invented and increasingly applied, however, that is under the assumption of both transaction parties are honest and trustworthy. In reality there is serious information asymmetry between the transaction participators. Information asymmetry may cause resource providers opportunistically exploit the information gap for resource consumers on...
In this paper, a novel peer-to-peer (P2P) neighbor selection mechanism was proposed to enhance the efficiency of the file sharing process in P2P networks. In the mechanism, a modified and well-designed neighbor peer selection approach was introduced, which selects the neighbor peer based on the weighted value it holds. The weighted value includes several factors, such as the trust value, the number...
In this paper, a novel access control scheme based on Bayesian trust network is developed to address to the security services in P2P environments. The trust mechanism is constructed with Bayesian network model, which could describe precise trust degree of the P2P node responding to various operation or access. The model of access control is proposes with Bayesian trust network of P2P members, and...
Educational resources is very rich, but the utilization rate is very low. There is a lot of redundancy and waste., To the whole education it would be a big step forward if We can integrate educational resources with the Internet to achieve the sharing of resources. peer-to-peer technology to share resources solves the problem. But some of the shortcomings of its own bring a number of other issues...
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
Self signed certificates for SSL and self generated hosts keys for SSH are popular zero cost, simple alternatives to public key infrastructure (PKI). They provide security against man in the middle attacks, as long as the the client connecting to those services knows the certificates or host keys a priori. A simple solution used in practice is to trust the certificate or the host key when the client...
The paper discussed the emerging technologies that can help address the challenges of trust in cloud computing. Cloud computing provides many opportunities for enterprises by offering a range of computing services. In today's competitive environment, the service dynamism, elasticity, and choices offered by this highly scalable technology are too attractive for enterprises to ignore. These opportunities,...
Opinion fusion in subjective logic consists of combining separate observers' opinions about the same frame of discernment. The principle of fission is the opposite of fusion, namely to split an opinion into two separate opinions which when fused would produce the original opinion. Different fusion methods can be applied, depending on the situation to be modelled. The cumulative fusion operator and...
Wireless Mesh Networks (WMN), this term was coined few years back in network research community. Due to its profound applicability, highly reliable connectivity, easy deployment, flexible interoperability with other networks drew much attention even within this short time. Although, lot of work is going on in this field but still issues like privacy and trust are left unattended. This paper address...
This paper emerges from research by (Alter, S. et al., 2004), (Dillard, K. et al., 2004), (Landoll, D.J., 2006) and (Soliman, K., 2006), and it draws on real-world examples so as to underline some limits of quantitative risk assessment. The paper is a case study and emphasized that theoretical formulas used in information security risk assessments do not contain the time dimension of the analysis...
The growing number of PKIs (Public Key Infrastructure) and the increasing number of situations where partners of a transaction may carry certificates signed by different CAs (Certification Authority) point out the problematic of trust between the different CAs. The degree to which a relying party can trust a CA depends upon the quality of its announced policy and its commitment to this policy. In...
Many existing trust management frameworks for Web services are built on the basic idea that the system maintains reputation or trust-level of the servers and users, and makes them available to other interested entities to make decisions on weather to engage in a transaction. In this case the quality of the reputation value depends on the quality of the feedback provided by transacting participants...
In ad-hoc environments, all nodes have function to set themselves a route and build a network. It is important how trustable each node is in the environment. This study proposes the cluster-based trust model, and uses the model to discuss how you can solve some possible problems occurred in the network. The reputation from a neighboring node is applied to the calculation of the trust value. If the...
Trust and reputation mechanisms play important roles in large open environments. In order to have more precise trust evaluation, trust models try to gather as much information as possible. The most used source of information is interaction history between agents in the system. Besides, some trust models consider additional information; context is one of them. However, there is no consensus over what...
This paper explores the use of rationale for understanding the context of reputation information so as to facilitate the exchange and transfer of reputation information across distributed heterogeneous reputation systems for selection of the best service for a particular user's requirements.
Proliferation of collaboration environments brings new issues to the area of security. In this paper, we briefly describe the characteristics of security associated with collaboration environments. We also discuss and analyze several schemes in different areas of security, including access control, secure group communication, and security management. Another contribution of this paper is a proposed...
To make the Internet today more connective with better performance, we developed the SoftInternet system, which consists of application layer proxies operated in P2P structure. To keep malicious peers out of the system in the beginning, we propose the model for admission control policy based on trust friend recommendations in social networks. We simulate the model to analyze the parameters and its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.