intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Computational trust

Xem 1-20 trên 65 kết quả Computational trust
  • This paper aims to address this limitation by introducing techniques for estimating trustworthiness from a community context. These techniques rely on similarity measures or operators within the framework of path algebra.

    pdf8p vithomson 02-07-2024 0 0   Download

  • Part 2 book "Computer security - Principles and practice" includes content: Operating system security, human resources security, security auditing, legal and ethical aspects, internet security protocols and standards, symmetric encryption and message confidentiality, trusted computing and multilevel security, it security management and risk assessment, physical and infrastructure security, it security controls, plans, and procedures,... and other contents.

    pdf402p muasambanhan10 11-04-2024 2 1   Download

  • Ebook Mobile wireless network security privacy Part 1 includes contents: Chapter 1 research directions in security and privacy for mobile and wireless networks; chapter 2 pervasive systems: enhancing trust negotiation with privacy support; chapter 3 applying trust in mobile and wireless networks; chapter 4 a framework for computing trust in mobile ad-hoc networks; chapter 5 the concept of opportunistic networks and their research challenges in privacy and security.

    pdf129p longtimenosee05 31-03-2024 2 0   Download

  • The goal of the workshop was not to focus on specific, even novel mechanisms, rather on the interfaces between mechanisms in different technical and social problem spaces. 21 people from different parts of the world took part in the one-day discussion, including PhD students, seasoned and junior researchers. This workshop promises to be a lasting experience and we encourage researchers to participate in future events. We hope that you will find its proceedings useful and valuable to read.

    pdf182p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • Secure data management in decentralized systems presents a collection of essays, covering a wide range of today's active areas closely related to database security organized as follows. In Part I, We review classical work in database security, and report their recent advances and necessary extensions. In Part 11, We shift our focus to security of the Extensible Markup Language (XML) and other new data models. The need for cross-domain resource and information sharing dramatically changes the approaches to access control.

    pdf461p longtimenosee05 31-03-2024 8 0   Download

  • There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    pdf482p longtimenosee03 22-02-2024 2 2   Download

  • Ebook Hacking exposed Linux: Linux security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 applying security, Chapter 2 applying interactive controls, Chapter 3 applying process controls, Chapter 4 local access control, Chapter 5 data networks security, Chapter 6 unconventional data attack vectors, chapter 7 voice over IP, chapter 8 wireless networks, chapter 9 input/output devices, chapter 10 RFID radio frequency identification, chapter 11 emanation attacks, chapter 12 trusted computing.

    pdf397p haojiubujain010 14-12-2023 7 2   Download

  • Ebook "Mobile cloud computing" includes content: Mobile computing, cloud computing, mobile cloud computing, offloading in mobile cloud computing, green mobile cloud computing, resource allocation in mobile cloud computing, sensor mobile cloud computing, mobile social cloud computing, privacy and security in mobile cloud computing, trust in mobile cloud computing, vehicular mobile cloud computing, business aspects of mobile cloud computing,... and other contents.

    pdf368p haojiubujain07 20-09-2023 5 4   Download

  • Part 1 of ebook "Building the Infrastructure for Cloud security: A solutions view" provides readers with contents including: cloud computing basics; the trusted cloud - addressing security and compliance; platform boot integrity - foundation for trusted compute pools; attestation - proving trustability; boundary control in the cloud - geo-tagging and asset tagging;...

    pdf128p tieulangtran 28-09-2023 5 2   Download

  • Continued part 1, part 2 of ebook "Platform embedded security technology revealed: Safeguarding the future of computing with Intel embedded security and management engine" provides readers with contents including: privacy at the next level: intel’s enhanced privacy identification (EPID) technology; boot with integrity, or don’t boot; trust computing, backed by the intel platform trust technology; unleashing premium entertainment with hardware-based content protection technology; breaking the boundaries with dynamically loaded applications;...

    pdf143p tieulangtran 28-09-2023 5 3   Download

  • Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in short range devices, sensor networks, control systems, and other areas continues to develop. Focusing on practical potential solutions, this text covers security and quality of service in ad hoc wireless networks.

    pdf196p haojiubujain06 05-09-2023 10 3   Download

  • Ebook Security in distributed, grid, mobile, and pervasive computing: Part 2 includes contents: Chapter 10 state-of-the-art security in grid computing; chapter 11 unifying grid and organizational security mechanisms; chapter 12 grid security architecture: requirements, fundamentals, standards and models; chapter 13 a trust-based access control management framework for a secure grid environment; chapter 14 distributed computing grids — safety and security; chapter 15 security solutions for pervasive healthcare; chapter 16 wireless sensor network security: a survey.

    pdf219p haojiubujain06 05-09-2023 3 3   Download

  • This paper is to present a novel model of estimating trustworthiness of a truster on a trustee based on experience trust and reputation trust from some community within the context of user’s topic interests.

    pdf17p vimulcahy 18-09-2023 6 4   Download

  • Data clustering is applied in various fields such as document classification, dental Xray image segmentation, medical image segmentation, etc. Especially, clustering algorithms are used in satellite image processing in many important application areas, including classification of vehicles participating in traffic, logistics, classification of satellite images to forecast droughts, floods, forest fire, etc.

    pdf15p vimulcahy 18-09-2023 2 2   Download

  • Ebook Foundations of computer security includes contents: Chapter 1 physical security, chapter 2 viruses, chapter 3 worms, chapter 4 trojan horses, chapter 5 examples of malware, chapter 6 prevention and defenses, chapter 7 network security, chapter 8 authentication, chapter 9 spyware, chapter 10 identity theft, chapter 11 privacy and trust, chapter 12 elements of cryptography.

    pdf389p haojiubujain06 05-09-2023 4 2   Download

  • Ebook Security in wireless mesh networks: Part 1 includes contents: Chapter 1 an introduction to wireless mesh networks; chapter 2 mesh networking in wireless PANs, LANs,MANs, and WANs; chapter 3 attacks and security mechanisms; chapter 4 intrusion detection in wireless mesh networks; chapter 5 secure routing in wireless mesh networks; chapter 6 hop integrity in wireless mesh networks; chapter 7 privacy preservation in wireless mesh networks; chapter 8 providing authentication, trust, and privacy in wireless mesh networks; chapter 9 non-interactive key establishment in wireless mesh network...

    pdf357p haojiubujain06 06-09-2023 8 5   Download

  • Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…

    pdf210p haojiubujain06 06-09-2023 10 3   Download

  • In this paper, we propose a computational model of topic-aware experience trust on social networks, which is a function of user interest degrees and refinement of interaction types including degrees of familiarity, dispatches and responses.

    pdf7p viannee 04-08-2023 7 4   Download

  • Ebook Intelligence integration in distributed knowledge management: Part 2 presents the following content: Chapter VII: Aspects of openness in multi-agent systems: Coordinating the autonomy in agent societies; Chapter VIII: How can we trust agents in multi-agent environments? Techniques and challenges; Chapter IX: The concept of autonomy in distributed computation and multi-agent systems; Chapter X: An agent-based library management system using RFID technology; Chapter XI: Mechanisms to restrict exploitation and improve societal performance in multi-agent systems; Chapter XII: Norm emergen...

    pdf250p runthenight08 12-04-2023 7 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2