Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








181,706 Hits in 5.5 sec

Extracting trust information from security system of a service

Şerif Bahtiyar, Mehmet Ufuk Çağlayan
2012 Journal of Network and Computer Applications  
In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity.  ...  The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service.  ...  Specifically, extracted trust information is a combination of information extracted from the security policy of a service and the security system of the service.  ... 
doi:10.1016/j.jnca.2011.10.002 fatcat:fdtuuo6obvazrh7lvxjedsiv4m

A Generalized Trust Model for Computational Grids & Clouds

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The major problem is to trust Grid Service Providers, Grid Users, Cloud Service Providers and Cloud Users for doing the transactions, in their respective environment, as there are many systems from various  ...  The T-CGE trust model helps the end users to get better and consistent services from their application developers.  ...  Trust Center uses Assessment Process to extract top trusted service providers information from the repository.  ... 
doi:10.35940/ijitee.b7699.129219 fatcat:y35yrzj77bdkdc4ovzp53lz3fe

A Meta-model for Legal Compliance and Trustworthiness of Information Systems [chapter]

Fatemeh Zarrabi, Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam, David Preston
2012 Lecture Notes in Business Information Processing  
This paper presents a novel meta-model, which combines legal and trust related concepts, to enable information systems developers to model and reason about the trustworthiness of a system in terms of its  ...  Information systems manage and hold a huge amount of important and critical information. For this reason, information systems must be trustworthy and should comply with relevant laws and regulations.  ...  The second author would like to acknowledge funding from the Engineering and Physical Sciences Research Council (EPSRC) and British Telecom (BT).  ... 
doi:10.1007/978-3-642-31069-0_4 fatcat:zqyguh4paffmhocsrjnrjq5uoi

Higher Education Cloud Computing in South Africa: Towards Understanding Trust and Adoption issues

Karl Van Der Schyff, Kirstin Krauss
2014 South African Computer Journal  
This paper sets out to study the views of key stakeholders on the issue of cloud information security within institutions of Higher Education.  ...  A specific focus is on understanding trust and the adoption of cloud computing in context of the unique operational requirements of South African universities.  ...  This leads the researchers to infer that key stakeholders make more assumptions about the concept of trust and information security when they have to pay for a cloud service.  ... 
doi:10.18489/sacj.v55i0.254 fatcat:botvet43ynfgfoxlxc2b4vucky

Trust Management in the World of Cloud Computing. Past Trends and Some New Directions

Mahreen Saleem, M.R Warsi, Saiful Islam, Areesha Anjum, Nadia Siddiquii
2021 Scalable Computing : Practice and Experience  
The underlying issues of privacy, security, and trust are the major barriers to the adoption of cloud by individuals and organizations as a whole.  ...  We proposed an approach for verifying whether the right software is running for the correct services in a trusted manner by analyzing features generated from the output cloud processed data.  ...  Trust information can be used as a metric to analyze system state in a particular duration or service context. Trust information can perform other tasks in addition to facilitating service selection.  ... 
doi:10.12694/scpe.v22i4.1952 fatcat:s2yz7ihudbdqnjkjml5yorbvim

A Policy and Trust-based Secure Communication Protocol in Information Systems

T. ChalamaReddy, R. Seshadri
2014 International Journal of Computer Applications  
Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information.  ...  In this study, secure and trusted information sharing environment is a vital requirement to make users interact and share data easily and securely across various networks.  ...  Information security policies are services that provide security for data that transferring from source system to destination system.  ... 
doi:10.5120/17296-7695 fatcat:4lsn4b6ghbh3jcckcgyqetq5t4

A Structural Topic Model for Exploring User Satisfaction with Mobile�Payments

Jang Hyun Kim, Jisung Jang, Yonghwan Kim, Dongyan Nan
2022 Computers Materials & Continua  
Furthermore, based on the previous studies of trust and security, "lack of reliability" and "secure system" were categorized as trust and security, respectively.  ...  Then, we employed a structural topic model to investigate the relationship between the attributes extracted from online reviews and user satisfaction with mobile payment.  ...  Funding Statement: This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korean government (NRF-2020R1A2C1014957).  ... 
doi:10.32604/cmc.2022.029507 fatcat:yvhl3k3nsbdajouxmj43x5scki

Advances in Mobile Security Technologies

Jeong Hyun Yi, Aziz Mohaisen, Sean Yang, Ching-Hsien Hsu
2016 Mobile Information Systems  
Acknowledgments We would like to thank all of the authors who have submitted their research to this special issue.  ...  First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service.  ...  A detailed experimental usability analysis is performed to Mobile Information Systems demonstrate the effectiveness of the proposed scheme in comparison to the existing methods.  ... 
doi:10.1155/2016/9501918 fatcat:qmsk4fvjxfflvpegsevwjayndu

Distributed Trust Management Mechanism for the Internet of Things

Jing Pei Wang, Sun Bin, Yang Yu, Xin Xin Niu
2013 Applied Mechanics and Materials  
Firstly, we extract three basic elements-service, decision-making and self-organizing, of trust management from the investigated trust solutions.  ...  Trust management provides a potential solution for the security issues of distributed networks. However, there are rare researches about the trust mechanism for IoT in the literature.  ...  ACKNOWLEDGEMENT The work is supported by "National Natural Science Foundation of China (No. 61121061), (No. 61003285)."  ... 
doi:10.4028/www.scientific.net/amm.347-350.2463 fatcat:g2gdsuypwzg5noneda4ywppwru

A Roadmap for Establishing Trust Management Strategy in E-Commerce Services Using Quality Based Assessment

Rath Jairak, Prasong Praneetpolgrang, Nivet Chirawichitchai
2014 International Journal of Information Engineering and Electronic Business  
Trust has been reported as a key role in ebusiness, especially for a monetary based system like ecommerce.  ...  Furthermore, previous studies in managerial trust have not demonstrated trust management that can illustrate a method to link their solutions with the consumers' point of view.  ...  Security and privacy Protection of personal information and security in an electronic payment system are the major concerns among potential customers [13, 21, 23] .  ... 
doi:10.5815/ijieeb.2014.05.01 fatcat:5gltbt7hzfckfh27flhdky747a

Security standards for the semantic web

Bhavani Thuraisingham
2005 Computer Standards & Interfaces  
In particular XML security, RDF security, and secure information integration and trust on the semantic web are discussed.  ...  Finally some aspects of secure web services as well as directions for research and standards efforts for secure semantic web are provided. D 2004 Published by Elsevier B.V.  ...  Acknowledgements I thank the National Science Foundation and the MITRE Corporation for their support of my research on security issues for the semantic web.  ... 
doi:10.1016/j.csi.2004.07.002 fatcat:kztl5j3k75halch3xqu2djdhpi

Secure knowledge management: confidentiality, trust, and privacy

E. Bertino, L.R. Khan, R. Sandhu, B. Thuraisingham
2006 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
Knowledge management enhances the value of a corporation by identifying the assets and expertise as well as efficiently managing the resources.  ...  In this paper, secure knowledge management will be discussed, focusing on confidentiality, trust, and privacy.  ...  in Computer Science from Rutgers University, NJ, in 1975NJ, in , 1980NJ, in , and 1983 He is a Professor of Information and Software Engineering and Director of the Laboratory for Information Security  ... 
doi:10.1109/tsmca.2006.871796 fatcat:pnqtkbbuazaipeqlo3iz4isdri

Extracting and Analyzing the Implemented Security Architecture of Business Applications

B. J. Berger, K. Sohr, R. Koschke
2013 2013 17th European Conference on Software Maintenance and Reengineering  
In this paper, we propose a technique that automatically extracts the implemented security architecture of Java-based business applications from the source code.  ...  However, there is still a lack of tools that allow an analyst to assess the implemented security architecture of an application.  ...  A trust boundary divides a system into parts of different trust levels which implies that certain measures have to be undertaken to guarantee the security of the system.  ... 
doi:10.1109/csmr.2013.37 dblp:conf/csmr/BergerSK13 fatcat:2pqazywmovcslitv7wy7lahzz4

Token-based dynamic trust establishment for web services

Zhengping Wu, Alfred C. Weaver
2005 Proceedings of the 43rd annual southeast regional conference on - ACM-SE 43  
We propose a method whereby the client discovers the web service's requirements from the service's policy document, then formulates a single trust primitive by associating a set of client attributes with  ...  One of these is the lack of dynamic mechanisms that can simultaneously achieve both privacy and efficiency when establishing a new trust relationship.  ...  The security token held by the requester is also embedded in this service request message for proof of identity. (2) When the STS receives the service request, the STS extracts the security token from  ... 
doi:10.1145/1167253.1167304 dblp:conf/ACMse/WuW05 fatcat:ac5wtoglorhf7iln6l256yd7ki

Secure sensitive data sharing on a big data platform

Xinhua Dong, Ruixuan Li, Heng He, Wanwan Zhou, Zhengyuan Xue, Hao Wu
2015 Tsinghua Science and Technology  
of system functions.  ...  At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security.  ...  Acknowledgements This work was supported by the National Natural Science Foundation of China (Nos. 61173170, 61300222, 61433006, and U1401258), and Independent Innovation Fund of Huazhong University of  ... 
doi:10.1109/tst.2015.7040516 fatcat:d4r4zfaeivc4hjtqwckufcaute
« Previous Showing results 1 — 15 out of 181,706 results