A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Extracting trust information from security system of a service
2012
Journal of Network and Computer Applications
In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. ...
The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. ...
Specifically, extracted trust information is a combination of information extracted from the security policy of a service and the security system of the service. ...
doi:10.1016/j.jnca.2011.10.002
fatcat:fdtuuo6obvazrh7lvxjedsiv4m
A Generalized Trust Model for Computational Grids & Clouds
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The major problem is to trust Grid Service Providers, Grid Users, Cloud Service Providers and Cloud Users for doing the transactions, in their respective environment, as there are many systems from various ...
The T-CGE trust model helps the end users to get better and consistent services from their application developers. ...
Trust Center uses Assessment Process to extract top trusted service providers information from the repository. ...
doi:10.35940/ijitee.b7699.129219
fatcat:y35yrzj77bdkdc4ovzp53lz3fe
A Meta-model for Legal Compliance and Trustworthiness of Information Systems
[chapter]
2012
Lecture Notes in Business Information Processing
This paper presents a novel meta-model, which combines legal and trust related concepts, to enable information systems developers to model and reason about the trustworthiness of a system in terms of its ...
Information systems manage and hold a huge amount of important and critical information. For this reason, information systems must be trustworthy and should comply with relevant laws and regulations. ...
The second author would like to acknowledge funding from the Engineering and Physical Sciences Research Council (EPSRC) and British Telecom (BT). ...
doi:10.1007/978-3-642-31069-0_4
fatcat:zqyguh4paffmhocsrjnrjq5uoi
Higher Education Cloud Computing in South Africa: Towards Understanding Trust and Adoption issues
2014
South African Computer Journal
This paper sets out to study the views of key stakeholders on the issue of cloud information security within institutions of Higher Education. ...
A specific focus is on understanding trust and the adoption of cloud computing in context of the unique operational requirements of South African universities. ...
This leads the researchers to infer that key stakeholders make more assumptions about the concept of trust and information security when they have to pay for a cloud service. ...
doi:10.18489/sacj.v55i0.254
fatcat:botvet43ynfgfoxlxc2b4vucky
Trust Management in the World of Cloud Computing. Past Trends and Some New Directions
2021
Scalable Computing : Practice and Experience
The underlying issues of privacy, security, and trust are the major barriers to the adoption of cloud by individuals and organizations as a whole. ...
We proposed an approach for verifying whether the right software is running for the correct services in a trusted manner by analyzing features generated from the output cloud processed data. ...
Trust information can be used as a metric to analyze system state in a particular duration or service context. Trust information can perform other tasks in addition to facilitating service selection. ...
doi:10.12694/scpe.v22i4.1952
fatcat:s2yz7ihudbdqnjkjml5yorbvim
A Policy and Trust-based Secure Communication Protocol in Information Systems
2014
International Journal of Computer Applications
Security in information systems has increased importance, as end users have become more responsive of securely sharing or exchanging the vast amount of information. ...
In this study, secure and trusted information sharing environment is a vital requirement to make users interact and share data easily and securely across various networks. ...
Information security policies are services that provide security for data that transferring from source system to destination system. ...
doi:10.5120/17296-7695
fatcat:4lsn4b6ghbh3jcckcgyqetq5t4
A Structural Topic Model for Exploring User Satisfaction with Mobile�Payments
2022
Computers Materials & Continua
Furthermore, based on the previous studies of trust and security, "lack of reliability" and "secure system" were categorized as trust and security, respectively. ...
Then, we employed a structural topic model to investigate the relationship between the attributes extracted from online reviews and user satisfaction with mobile payment. ...
Funding Statement: This work was supported by a National Research Foundation of Korea (NRF) grant funded by the Korean government (NRF-2020R1A2C1014957). ...
doi:10.32604/cmc.2022.029507
fatcat:yvhl3k3nsbdajouxmj43x5scki
Advances in Mobile Security Technologies
2016
Mobile Information Systems
Acknowledgments We would like to thank all of the authors who have submitted their research to this special issue. ...
First of all, a three-layered distributed trust communication architecture was presented in IDTrust so as to separate evidence collector and trust decision from P2P service. ...
A detailed experimental usability analysis is performed to Mobile Information Systems demonstrate the effectiveness of the proposed scheme in comparison to the existing methods. ...
doi:10.1155/2016/9501918
fatcat:qmsk4fvjxfflvpegsevwjayndu
Distributed Trust Management Mechanism for the Internet of Things
2013
Applied Mechanics and Materials
Firstly, we extract three basic elements-service, decision-making and self-organizing, of trust management from the investigated trust solutions. ...
Trust management provides a potential solution for the security issues of distributed networks. However, there are rare researches about the trust mechanism for IoT in the literature. ...
ACKNOWLEDGEMENT The work is supported by "National Natural Science Foundation of China (No. 61121061), (No. 61003285)." ...
doi:10.4028/www.scientific.net/amm.347-350.2463
fatcat:g2gdsuypwzg5noneda4ywppwru
A Roadmap for Establishing Trust Management Strategy in E-Commerce Services Using Quality Based Assessment
2014
International Journal of Information Engineering and Electronic Business
Trust has been reported as a key role in ebusiness, especially for a monetary based system like ecommerce. ...
Furthermore, previous studies in managerial trust have not demonstrated trust management that can illustrate a method to link their solutions with the consumers' point of view. ...
Security and privacy Protection of personal information and security in an electronic payment system are the major concerns among potential customers [13, 21, 23] . ...
doi:10.5815/ijieeb.2014.05.01
fatcat:5gltbt7hzfckfh27flhdky747a
Security standards for the semantic web
2005
Computer Standards & Interfaces
In particular XML security, RDF security, and secure information integration and trust on the semantic web are discussed. ...
Finally some aspects of secure web services as well as directions for research and standards efforts for secure semantic web are provided. D 2004 Published by Elsevier B.V. ...
Acknowledgements I thank the National Science Foundation and the MITRE Corporation for their support of my research on security issues for the semantic web. ...
doi:10.1016/j.csi.2004.07.002
fatcat:kztl5j3k75halch3xqu2djdhpi
Secure knowledge management: confidentiality, trust, and privacy
2006
IEEE transactions on systems, man and cybernetics. Part A. Systems and humans
Knowledge management enhances the value of a corporation by identifying the assets and expertise as well as efficiently managing the resources. ...
In this paper, secure knowledge management will be discussed, focusing on confidentiality, trust, and privacy. ...
in Computer Science from Rutgers University, NJ, in 1975NJ, in , 1980NJ, in , and 1983 He is a Professor of Information and Software Engineering and Director of the Laboratory for Information Security ...
doi:10.1109/tsmca.2006.871796
fatcat:pnqtkbbuazaipeqlo3iz4isdri
Extracting and Analyzing the Implemented Security Architecture of Business Applications
2013
2013 17th European Conference on Software Maintenance and Reengineering
In this paper, we propose a technique that automatically extracts the implemented security architecture of Java-based business applications from the source code. ...
However, there is still a lack of tools that allow an analyst to assess the implemented security architecture of an application. ...
A trust boundary divides a system into parts of different trust levels which implies that certain measures have to be undertaken to guarantee the security of the system. ...
doi:10.1109/csmr.2013.37
dblp:conf/csmr/BergerSK13
fatcat:2pqazywmovcslitv7wy7lahzz4
Token-based dynamic trust establishment for web services
2005
Proceedings of the 43rd annual southeast regional conference on - ACM-SE 43
We propose a method whereby the client discovers the web service's requirements from the service's policy document, then formulates a single trust primitive by associating a set of client attributes with ...
One of these is the lack of dynamic mechanisms that can simultaneously achieve both privacy and efficiency when establishing a new trust relationship. ...
The security token held by the requester is also embedded in this service request message for proof of identity. (2) When the STS receives the service request, the STS extracts the security token from ...
doi:10.1145/1167253.1167304
dblp:conf/ACMse/WuW05
fatcat:ac5wtoglorhf7iln6l256yd7ki
Secure sensitive data sharing on a big data platform
2015
Tsinghua Science and Technology
of system functions. ...
At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security. ...
Acknowledgements This work was supported by the National Natural Science Foundation of China (Nos. 61173170, 61300222, 61433006, and U1401258), and Independent Innovation Fund of Huazhong University of ...
doi:10.1109/tst.2015.7040516
fatcat:d4r4zfaeivc4hjtqwckufcaute
« Previous
Showing results 1 — 15 out of 181,706 results