نتایج جستجو برای: trust management
تعداد نتایج: 902691 فیلتر نتایج به سال:
Trust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy.
Trust management involves the identification and analysis of trust relations. However, adequately managing trust requires all the relevant aspects of trust to be addressed. Moreover, which aspects to address depend on the perspective of the trust management. In this position paper we relate the notion of trust to the notions of uncertainty, subjectivity and risk, and we explain how these aspect...
Trust and Trust Management represent the very foundations of Computer and Network Security Protocols enabling all cyber activities. Recent spate of national and global high-impact Cyber Security compromises, threats, vulnerabilities, and exposures leads to fundamental questioning of Trust as the key enabler of all cyber phenomena in the unfolding era of exponentially increasing Distrust. It is ...
Trust is a major aspect of decision making when two parties are involved, and the lack of face to face exchanges of the Internet deeply changes relations and behaviours regarding the available services. The already existing trust management systems over the Internet are one way only. Either they allow a provider to tell what it expects from a client (identification, qualifications), either it a...
Public key management in mobile ad hoc networks (MANETs) has been studied for several decades. However, the unique characteristics of MANETs have imposed great challenges in designing a fully distributed public key management protocol under resource-constrained MANET environments. These challenges include no centralized trusted entities, resource constraints, and high security vulnerabilities. ...
Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. Identity management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Diffe...
Trust management is the main challenges in the cloud service environment. Trust management can be used to finding the securable service in the cloud environment. In this paper to focusing the trustable feedback analysis and also scalable analysis in both the consumer’s and provider privacy. Consumer privacy is not an easy goal for determining the information in both the trust management servers...
The Internet of Things – IoT – is a new paradigm in technology that allows most physical ‘things’ to contact each other. Trust between IoT devices is a critical factor. Trust in the IoT environment can be modeled using various approaches, such as confidence level and reputation parameters. Furthermore, trust is an important element in engineering reliable and scalable networks. In this paper, w...
Federation becomes pervasive in information sharing and collaborations over distributed systems, ubiquitous systems, and the Internet. Trust management plays a critical role to smooth collaborations and information sharing across different trust domains. The federation of trust management is a new direction for these networked systems. In this paper, the requirements and a set of evaluation met...
Trust management is emerging as a promising technology to facilitate collaboration among entities in an environment where traditional security paradigms cannot be enforced due to lack of centralized control and incomplete knowledge of the environment. However, prior art generally lack considerations on usable means to gather and disseminate experiential evidences, extract trust criteria from a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید