![](images/graphics/blank.gif)
Computational trust
-
This paper aims to address this limitation by introducing techniques for estimating trustworthiness from a community context. These techniques rely on similarity measures or operators within the framework of path algebra.
8p
vithomson
02-07-2024
0
0
Download
-
Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.
402p
muasambanhan10
11-04-2024
2
1
Download
-
Ebook Mobile wireless network security privacy Part 1 includes contents: Chapter 1 research directions in security and privacy for mobile and wireless networks; chapter 2 pervasive systems: enhancing trust negotiation with privacy support; chapter 3 applying trust in mobile and wireless networks; chapter 4 a framework for computing trust in mobile ad-hoc networks; chapter 5 the concept of opportunistic networks and their research challenges in privacy and security.
129p
longtimenosee05
31-03-2024
2
0
Download
-
The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will find its proceedings useful and valuable to read.
182p
longtimenosee05
31-03-2024
2
0
Download
-
Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.
342p
longtimenosee05
31-03-2024
0
0
Download
-
Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.
461p
longtimenosee05
31-03-2024
8
0
Download
-
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.
482p
longtimenosee03
22-02-2024
2
2
Download
-
Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.
397p
haojiubujain010
14-12-2023
7
2
Download
-
Ebook "Mobile cloud computing" includes content: Mobile computing, cloud computing, mobile cloud computing, offloading in mobile cloud computing, green mobile cloud computing, resource allocation in mobile cloud computing, sensor mobile cloud computing, mobile social cloud computing, privacy and security in mobile cloud computing, trust in mobile cloud computing, vehicular mobile cloud computing, business aspects of mobile cloud computing,... and other contents.
368p
haojiubujain07
20-09-2023
5
4
Download
-
Part 1 of ebook "Building the Infrastructure for Cloud security: A solutions view" provides readers with contents including: cloud computing basics; the trusted cloud - addressing security and compliance; platform boot integrity - foundation for trusted compute pools; attestation - proving trustability; boundary control in the cloud - geo-tagging and asset tagging;...
128p
tieulangtran
28-09-2023
5
2
Download
-
Continued part 1, part 2 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: privacy at the next level: intel’s enhanced privacy identification (EPID) technology; boot with integrity, or don’t boot; trust computing, backed by the intel platform trust technology; unleashing premium entertainment with hardware-based content protection technology; breaking the boundaries with dynamically loaded applications;...
143p
tieulangtran
28-09-2023
5
3
Download
-
Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in short range devices, sensor networks, control systems, and other areas continues to develop. Focusing on practical potential solutions, this text covers security and quality of service in ad hoc wireless networks.
196p
haojiubujain06
05-09-2023
10
3
Download
-
Ebook Security in distributed, grid, mobile, and pervasive computing: Part 2 includes contents: Chapter 10 state-of-the-art security in grid computing; chapter 11 unifying grid and organizational security mechanisms; chapter 12 grid security architecture: requirements, fundamentals, standards and models; chapter 13 a trust-based access control management framework for a secure grid environment; chapter 14 distributed computing grids — safety and security; chapter 15 security solutions for pervasive healthcare; chapter 16 wireless sensor network security: a survey.
219p
haojiubujain06
05-09-2023
3
3
Download
-
This paper is to present a novel model of estimating trustworthiness of a truster on a trustee based on experience trust and reputation trust from some community within the context of user’s topic interests.
17p
vimulcahy
18-09-2023
6
4
Download
-
Data clustering is applied in various fields such as document classification, dental Xray image segmentation, medical image segmentation, etc. Especially, clustering algorithms are used in satellite image processing in many important application areas, including classification of vehicles participating in traffic, logistics, classification of satellite images to forecast droughts, floods, forest fire, etc.
15p
vimulcahy
18-09-2023
2
2
Download
-
Ebook Foundations of computer security includes contents: Chapter 1 physical security, chapter 2 viruses, chapter 3 worms, chapter 4 trojan horses, chapter 5 examples of malware, chapter 6 prevention and defenses, chapter 7 network security, chapter 8 authentication, chapter 9 spyware, chapter 10 identity theft, chapter 11 privacy and trust, chapter 12 elements of cryptography.
389p
haojiubujain06
05-09-2023
4
2
Download
-
Ebook Security in wireless mesh networks: Part 1 includes contents: Chapter 1 an introduction to wireless mesh networks; chapter 2 mesh networking in wireless PANs, LANs,MANs, and WANs; chapter 3 attacks and security mechanisms; chapter 4 intrusion detection in wireless mesh networks; chapter 5 secure routing in wireless mesh networks; chapter 6 hop integrity in wireless mesh networks; chapter 7 privacy preservation in wireless mesh networks; chapter 8 providing authentication, trust, and privacy in wireless mesh networks; chapter 9 non-interactive key establishment in wireless mesh network...
357p
haojiubujain06
06-09-2023
8
5
Download
-
Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…
210p
haojiubujain06
06-09-2023
10
3
Download
-
In this paper, we propose a computational model of topic-aware experience trust on social networks, which is a function of user interest degrees and refinement of interaction types including degrees of familiarity, dispatches and responses.
7p
viannee
04-08-2023
7
4
Download
-
Ebook Intelligence integration in distributed knowledge management: Part 2 presents the following content: Chapter VII: Aspects of openness in multi-agent systems: Coordinating the autonomy in agent societies; Chapter VIII: How can we trust agents in multi-agent environments? Techniques and challenges; Chapter IX: The concept of autonomy in distributed computation and multi-agent systems; Chapter X: An agent-based library management system using RFID technology; Chapter XI: Mechanisms to restrict exploitation and improve societal performance in multi-agent systems; Chapter XII: Norm emergen...
250p
runthenight08
12-04-2023
7
1
Download