823 resultados para trust graph
Resumo:
L'ambiente di questa tesi è quello del Delay and Disruption Tolerant Networks (DTN), un'architettura di rete di telecomunicazioni avente come obiettivo le comunicazioni tra nodi di reti dette “challenged”, le quali devono affrontare problemi come tempi di propagazione elevati, alto tasso di errore e periodi di perdita delle connessioni. Il Bunde layer, un nuovo livello inserito tra trasporto e applicazione nell’architettura ISO/OSI, ed il protocollo ad esso associato, il Bundle Protocol (BP), sono stati progettati per rendere possibili le comunicazioni in queste reti. A volte fra la ricezione e l’invio può trascorrere un lungo periodo di tempo, a causa della indisponibilità del collegamento successivo; in questo periodo il bundle resta memorizzato in un database locale. Esistono varie implementazioni dell'architettura DTN come DTN2, implementazione di riferimento, e ION (Interplanetary Overlay Network), sviluppata da NASA JPL, per utilizzo in applicazioni spaziali; in esse i contatti tra i nodi sono deterministici, a differenza delle reti terrestri nelle quali i contatti sono generalmente opportunistici (non noti a priori). Per questo motivo all’interno di ION è presente un algoritmo di routing, detto CGR (Contact Graph Routing), progettato per operare in ambienti con connettività deterministica. È in fase di ricerca un algoritmo che opera in ambienti non deterministici, OCGR (Opportunistic Contact Graph Routing), che estende CGR. L’obiettivo di questa tesi è quello di fornire una descrizione dettagliata del funzionamento di OCGR, partendo necessariamente da CGR sul quale è basato, eseguire dei test preliminari, richiesti da NASA JPL, ed analizzarne i risultati per verificare la possibilità di utilizzo e miglioramento dell’algoritmo. Sarà inoltre descritto l’ambiente DTN e i principali algoritmi di routing per ambienti opportunistici. Nella parte conclusiva sarà presentato il simulatore DTN “The ONE” e l’integrazione di CGR e OCGR al suo interno.
Resumo:
Acknowledgments Dr. Sensoy thanks to the U.S. Army Research Laboratory for its support under grant W911NF-14-1-0199 and The Scientific and Technological Research Council of Turkey (TUBITAK) for its support under grant 113E238
Resumo:
In this article we investigate voter volatility and analyze the causes and motives of switching vote intentions. We test two main sets of variables linked to volatility in literature; political sophistication and ‘political (dis)satisfaction’. Results show that voters with low levels of political efficacy tend to switch more often, both within a campaign and between elections. In the analysis we differentiate between campaign volatility and inter-election volatility and by doing so show that the dynamics of a campaign have a profound impact on volatility. The campaign period is when the lowly sophisticated switch their vote intention. Those with higher levels of interest in politics have switched their intention before the campaign has started. The data for this analysis are from the three wave PartiRep Belgian Election Study (2009).
Resumo:
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
Resumo:
Secure Access For Everyone (SAFE), is an integrated system for managing trust
using a logic-based declarative language. Logical trust systems authorize each
request by constructing a proof from a context---a set of authenticated logic
statements representing credentials and policies issued by various principals
in a networked system. A key barrier to practical use of logical trust systems
is the problem of managing proof contexts: identifying, validating, and
assembling the credentials and policies that are relevant to each trust
decision.
SAFE addresses this challenge by (i) proposing a distributed authenticated data
repository for storing the credentials and policies; (ii) introducing a
programmable credential discovery and assembly layer that generates the
appropriate tailored context for a given request. The authenticated data
repository is built upon a scalable key-value store with its contents named by
secure identifiers and certified by the issuing principal. The SAFE language
provides scripting primitives to generate and organize logic sets representing
credentials and policies, materialize the logic sets as certificates, and link
them to reflect delegation patterns in the application. The authorizer fetches
the logic sets on demand, then validates and caches them locally for further
use. Upon each request, the authorizer constructs the tailored proof context
and provides it to the SAFE inference for certified validation.
Delegation-driven credential linking with certified data distribution provides
flexible and dynamic policy control enabling security and trust infrastructure
to be agile, while addressing the perennial problems related to today's
certificate infrastructure: automated credential discovery, scalable
revocation, and issuing credentials without relying on centralized authority.
We envision SAFE as a new foundation for building secure network systems. We
used SAFE to build secure services based on case studies drawn from practice:
(i) a secure name service resolver similar to DNS that resolves a name across
multi-domain federated systems; (ii) a secure proxy shim to delegate access
control decisions in a key-value store; (iii) an authorization module for a
networked infrastructure-as-a-service system with a federated trust structure
(NSF GENI initiative); and (iv) a secure cooperative data analytics service
that adheres to individual secrecy constraints while disclosing the data. We
present empirical evaluation based on these case studies and demonstrate that
SAFE supports a wide range of applications with low overhead.
Resumo:
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
Resumo:
In this paper, we describe a decentralized privacy-preserving protocol for securely casting trust ratings in distributed reputation systems. Our protocol allows n participants to cast their votes in a way that preserves the privacy of individual values against both internal and external attacks. The protocol is coupled with an extensive theoretical analysis in which we formally prove that our protocol is resistant to collusion against as many as n-1 corrupted nodes in the semi-honest model. The behavior of our protocol is tested in a real P2P network by measuring its communication delay and processing overhead. The experimental results uncover the advantages of our protocol over previous works in the area; without sacrificing security, our decentralized protocol is shown to be almost one order of magnitude faster than the previous best protocol for providing anonymous feedback.
Resumo:
There has been a debate for years about what the role of the ombudsman is. This article examines a key component of the role, to promote trust in public services and government. To be able to do this, however, an ombudsman needs to be perceived as legitimate and be trusted by a range of stakeholders, including the user. This article argues that three key relationships in a person’s complaint journey can build trust in an institution, and must therefore be understood as a system. The restorative justice framework is adapted to conceptualize this trust model as a novel approach to understanding the institution from the perspective of its users. Taking two public sector ombudsmen as examples, the article finds that voice and trust need to be reinforced through the relationships in a consumer journey to manage individual expectations, prevent disengagement, and thereby promote trust in the institution, in public service providers, and in government.
Resumo:
This paper explores the ways in which consumers’ brand trust during a brand crisis is affected through direct experience versus when it is amplified through mass media. By using case-study methodology, our findings reveal that generalised public images of a product crisis initiate a public perception of risk, which provides more negative effects on brand trust than the actual consumers’ experience does. We introduce the media as a third partner influencing the trust relationship between consumers and brands, and offer suggestions for restoring and preserving customers’ brand trust.
Resumo:
Este artículo presenta una investigación en la que se analizan las dificultades del profesorado para planificar, coordinar y evaluar competencias claves en una muestra de 23 centros educativos. El tema tiene hondas repercusiones ya que una mala praxis educativa de las competencias claves puede conculcar uno de los derechos fundamentales del alumnado a ser evaluado de forma objetiva (LODE: Art.6b y RD 732/1995: Art. 13.1) y poder superar las pruebas de evaluación consideradas necesarias para la obtención del título académico mínimo que otorga el estado español. La investigación se ha desarrollado desde una doble perspectiva metodológica; en primer lugar, es una investigación descriptiva en la que presentamos las características fundamentales de las competencias claves y la normativa básica para su desarrollo y evaluación. En segundo lugar, aplicamos un procedimiento de análisis con una doble vertiente cualitativa mediante el empleo del programa Atlas-Ti y del enfoque reticular-categorial del análisis de redes sociales con la aplicación de UCINET y el visor yED Graph Editor para abordar el análisis de las principales dificultades y obstáculos detectados. Los resultados muestran que existen serias dificultades en las tres dimensiones analizadas: "planificación", "coordinación" y "evaluación" de competencias clave; especialmente en la necesidad de formación del profesorado, en la evaluación de las competencias, en la metodología para su desarrollo y en los procesos de coordinación interna para su consecución en los centros educativos.
Resumo:
This session will provide you with opportunity to find out what is being achieved and explore the implications for your own practice.
Resumo:
Graph analytics is an important and computationally demanding class of data analytics. It is essential to balance scalability, ease-of-use and high performance in large scale graph analytics. As such, it is necessary to hide the complexity of parallelism, data distribution and memory locality behind an abstract interface. The aim of this work is to build a scalable graph analytics framework that does not demand significant parallel programming experience based on NUMA-awareness.
The realization of such a system faces two key problems:
(i)~how to develop a scale-free parallel programming framework that scales efficiently across NUMA domains; (ii)~how to efficiently apply graph partitioning in order to create separate and largely independent work items that can be distributed among threads.
Resumo:
Setting: Psychological stress is increasingly recognised within emergency medicine, given the environmental and clinical stressors associated with the specialism. The current study assessed whether psychological distress is experienced by emergency medical staff and if so, what is the expressed need within this population? Participants: Participants included ambulance personnel, nursing staff, doctors and ancillary support staff within two Accident and Emergency (A&E) departments and twelve ambulance bases within one Trust locality in NI (N = 107). Primary and secondary outcome measures: The General Health Questionnaire (GHQ-12, Goldberg, 1972, 1978), Secondary Traumatic Stress Scale (STSS, Bride, 2004) and an assessment of need questionnaire were completed and explored using mixed method analysis. Results: Results showed elevated levels of psychological distress within each profession except ambulance service clinical support officers (CSOs). Elevated levels of secondary trauma symptomatology were also found; the highest were within some nursing grades and junior doctors. Decreased enjoyment in job over time was significantly associated with higher scores. Analysis of qualitative data identified sources of stress to include low morale. A total of 65% of participants thought that work related stressors had negatively affected their mental health. Participants explored what they felt could decrease psychological distress including improved resources and psychoeducation. Conclusion: There were elevated levels of distress and secondary traumatic stress within this population as well as an expressed level of need, on both systemic and support levels.