915 resultados para WS-Trust


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Establishing trust for resource sharing and collaboration has become an important issue in distributed computing environment. In this paper, we investigate the problem of establishing trust in hybrid cloud computing environments. As the scope of federated cloud computing enlarges to ubiquitous and pervasive computing, there will be a need to assess and maintain the trustworthiness of the cloud computing entities. We present a fully distributed framework that enable trust-based cloud customer and cloud service provider interactions. The framework aids a service consumer in assigning an appropriate weight to the feedback of different raters regarding a prospective service provider. Based on the framework, we developed a mechanism for controlling falsified feedback ratings from iteratively exerting trust level contamination due to falsified feedback ratings. The experimental analysis shows that the proposed framework successfully dilutes the effects of falsified feedback ratings, thereby facilitating accurate and fair assessment of the service reputations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While cloud computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A data owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a cloud service provider (CSP). This machine is at a location unknown to a data owner. This loss of control over data is further intensified with the lack of managing users' access to the data from practical cloud computing perspectives. In this paper, we introduce a new mechanism of ensuring trust and security in Software as a Service (SaaS) CC. Trust Ticket, with the supporting protocols, is our mechanism that helps a data owner in establishing a link between a CSP and a registered user. In our mechanism, a user first gets registered with a DO before receiving a Trust Ticket and a secret key from that DO. Each Trust Ticket is unique and encrypted. On completing the registration of each user, the DO apprises the CSP of the Trust Ticket. Trust Ticket and secret key are respectively for the registered user's getting accepted to the CSP and having a view of the data owner's data upon a successful verification by the CSP. We have done our experiment in Java network programming by creating an emulated cloud computing framework under the VMware ESXi 4.1 hyper visor based platform. Using the framework, we have evaluated our algorithmic protocol for Trust Ticket. We have also compared our work with prior work. Overall performance of our work is better. We argue that our proposed algorithmic protocol for Trust Ticket deployment establishes a data owner's trust. This trust is established through a data owner's control over data and a registered user, because a registered user is linked with a CSP by a data owner through Trust Ticket.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research also aims to develop a robust trust framework which can improve the understanding of the theory to support trust in alliancing, in particular the ALT and AMT relationship to improve project success factors. Research in trust within the construction industry has not yet examined how the relational signals within the five situations in the normative framework identified by Siegwart Lindenberg affect the level of trustworthiness between partners. More research is necessary to explore potential frameworks that can be used as the basis for future research in trust. Data from previous research in the performance of alliance has been used to verify the proposed framework. The framework will be developed in the ALT and AMT relationship to improve project success factors within the alliance. The originality of this research is trying to understand trust in the context of project alliancing in Australia as there are an increasing number of construction projects using the alliancing procurement method. Additionally, this research is examining the conditions of trust from the ALT and AMT teams specifically formed for the collaboration of project alliancing.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the trust issue in wireless sensor networks is emerging as one important factor in security schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper we categorize various types of attacks and countermeasures related to trust schemes in WSNs. Furthermore, we provide the development of trust mechanisms, give a short summarization of classical trust methodologies and emphasize the challenges of trust scheme in WSNs. An extensive literature survey is presented by summarizing state-of-the-art trust mechanisms in two categories: secure routing and secure data. Based on the analysis of attacks and the existing research, an open field and future direction with trust mechanisms in WSNs is provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Based on recent research with Indigenous people in south eastern Australia and non-Indigenous supporters of their struggles, this paper explores the question of trust: something that recurred in non-Indigenous people's thinking about their work. It looks at different approaches to working in a context in which distrust is well-founded. The paper suggests a revisiting of key works on accountability as a possible resource for transformative relationships.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This overview of David Hume’s wide-ranging observations is a matrix portraying the key elements of a pragmatic pathway to a moral decision that can be applied in any situation where organisational decisions need to be made. 

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a neural network (NN)-based multi-agent classifier system (MACS) utilising the trust-negotiation-communication (TNC) reasoning model is proposed. A novel trust measurement method, based on the combination of Bayesian belief functions, is incorporated into the TNC model. The Fuzzy Min-Max (FMM) NN is used as learning agents in the MACS, and useful modifications of FMM are proposed so that it can be adopted for trust measurement. Besides, an auctioning procedure, based on the sealed bid method, is applied for the negotiation phase of the TNC model. Two benchmark data sets are used to evaluate the effectiveness of the proposed MACS. The results obtained compare favourably with those from a number of machine learning methods. The applicability of the proposed MACS to two industrial sensor data fusion and classification tasks is also demonstrated, with the implications analysed and discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Now days, the online social networks (OSN) have gained considerable popularity. More and more people use OSN to share their interests and make friends, also the OSN helps users overcome the geographical barriers. With the development of OSN, there is an important problem users have to face that is trust evaluation. Before user makes friends with a stranger, the user need to consider the following issues: Can a stranger be trusted? How much the stranger can be trusted? How to measure the trust of a stranger? In this paper, we take two factors, Degree and Contact Interval into consideration, which produce a new trust evaluation model (T-OSN). T-OSN is aimed to solve how to evaluate the trust value of an OSN user, also which is more efficient, more reliable and easy to implement. Base on our research, this model can be used in wide range, such as online social network (OSN) trust evaluation, mobile network message forwarding, ad hoc wireless networking, routing message on Internet and peer-to-peer file sharing network. The T-OSN model has following obvious advantages compare to other trust evaluate methods. First of all, it is not base on features of traditional social network, such as, distance and shortest path. We choose the special features of OSN to build up the model, that is including numbers of friends(Degree) and contact frequency(Contact Interval). These species features makes our model more suitable to evaluate OSN users trust value. Second, the formulations of our model are quite simple but effective. That means, to calculate the result by using our formulations will not cost too much resources. Last but not least, our model is easy to implement for an OSN website, because of the features that we used in our model, such as numbers of friends and contact frequency are easy to obtain. To sum up, our model is using a few resources to obtain a valuable trust value that can help OSN users to solve an important security problem, we believe that will be big step - or development of OSN.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigated the problem of strategic manipulation of feedback attacks and proposed an approach that makes trust management systems sufficiently robust against feedback manipulation attacks. The new trust management system enables potential service consumers to determine the risk level of a service before committing to proceed with the transaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Through experimentation, we establish a causal relationship between trust and the expansion of a retailer from online to brick-and-mortar and vice versa. Trust is multidimensional and contingent on the distribution path first chosen. Vendor trustworthiness (knowledge-based) and technological trustworthiness (institution-based) have different effects depending on the initial and new distribution channel. Expanding from brick-and-mortar to online negatively affects technology-based trust, while transfers from an online to a physical location maintain the same level of technology-based trust. Vendor-based trust is positively affected by transfer from online to the brick-and-mortar location, and is not significantly unaffected by transfers from brick and-mortar to online locations. The perceived “permanence” of a physical location influences consumer beliefs about the location’s trustworthiness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The basic differences between marketing managers and their technically trained counterpart managers [e.g., research and development (R&D), engineering, and manufacturing managers] in terms of work experience, training, and differing decision-making styles have often been suggested as a source of conflict, which acts as a barrier to effective working relationships and integration during new product development (NPD) work. In this paper, we empirically explore this issue by developing and testing a model of psychosocial differences (thought worlds and psychological distance) between the two groups of managers and their effect on communication, trust, and relationship effectiveness during NPD projects. We find that while thought world differences do still matter, it was from a marketing perspective that they had a stronger effect. These findings have implications for top management trying to manage the functional manager interface during NPD projects. We propose a semi-formalized approach to relationship building that may speed up the acquisition of social data that is often necessary to elevate working relationships to trusting ones and improve the efficiency of NPD work. Our model is tested using data from two samples, 184 technically trained managers and 145 marketing managers from Australian companies involved in NPD work.