Academic literature on the topic 'Trust by the way of security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trust by the way of security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trust by the way of security"

1

Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.

Full text
Abstract:
IoT security is a combination of physical device security and network security. The objective of the IoT security module is to hide the network from communication vulnerabilities between the transmitter module and the server. Also, the security algorithms are designed to protect the systems from software attacks and physical hardware attacks. The paper explores the ongoing advancements and research in the field of IoT security by analyzing the research limitations and issues of the existing models. The research gaps identified from the literature analysis explores the way where the research on
APA, Harvard, Vancouver, ISO, and other styles
3

Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.

Full text
Abstract:
Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model w
APA, Harvard, Vancouver, ISO, and other styles
4

Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.

Full text
Abstract:
Customer disposition to data, nature of the information on site, protection<strong> </strong>concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest and will not harm you, or something is safe and reliable is called trust; while security is an attempt to safeguard the data from unauthorized access. Information security is a vital management as well as technical requir
APA, Harvard, Vancouver, ISO, and other styles
5

Zhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.

Full text
Abstract:
The article analyzes the influence of the social network on humanity. For many years, humanity has realized even in social networks the need for psychological security. Social media confrontation is psychological warfare on a virtual level. Expecting negative information on a social network, people communicate only with friends, like-minded people. Communication on the social network has intensified over the past three years, due to the pandemic in the world, minimal contact has entered the way of life of mankind. Nevertheless, any positive and negative information can affect the psychological
APA, Harvard, Vancouver, ISO, and other styles
6

Najib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.

Full text
Abstract:
In the rapidly growing and increasingly complex Internet of Things (IoT) ecosystem, securing communication and data exchanges between devices is a major concern. To address this, we proposed QS-Trust, a trust-based security model considering both Quality of Service (QoS) and social parameters. QS-Trust uses a trust value to determine the trust level between devices and employs a QoS-aware trust-based algorithm to improve the security of data transmissions. Additionally, the model incorporates intelligence parameters such as computing power, memory capacity, device behavior and context informat
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.

Full text
Abstract:
The purpose of this study is to analyze the factors that influence the information security compliance intention of Korean military officers. For this purpose, a research model was constructed focusing on information security compliance attitude and perceived control, which are the main variables of the theory of planned behavior. In addition, security sensitivity, organization trust, information security work impediment, and sanction, were selected as independent variables. The research model was analyzed through a survey targeting Korean army officers, and the results are as follows. First,
APA, Harvard, Vancouver, ISO, and other styles
8

Orkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.

Full text
Abstract:
Abstract Nowadays, businesses are building bottomless real-time connections with their customers, suppliers, partners, and governments, collecting and selectively sharing huge amounts of data. The value of stored and in-transit information is rising rapidly, driving new markets and generating a need for securely connecting devices and delivering trusted data. Data integrity is a vital component in economy which can pertain to individuals, companies, governments and globally. It is a measure of the validity and reliability of a data. While internal audit has taken some steps toward keeping up w
APA, Harvard, Vancouver, ISO, and other styles
9

Venkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.

Full text
Abstract:
Zero Trust Software-Defined Wide Area Network (SD-WAN) technology has emerged as a critical solution for the healthcare industry undergoing digital transformation. This architecture adopts a "never trust, always verify" article that fundamentally differs from traditional perimeter-based security models, making it particularly valuable in healthcare environments where diverse stakeholders require varying access to sensitive data. The implementation of Zero Trust SD-WAN delivers multiple benefits for healthcare organizations, including enhanced security through identity verification, continuous
APA, Harvard, Vancouver, ISO, and other styles
10

Surendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.

Full text
Abstract:
The current research paper assesses the financial and operational impacts of enforcing zero-trust security models in financial planning systems. As the risk of cyberattacks intensifies and the regulations become unexpectedly complicated, these groups are in a desperate search for a comprehensive security system. As such, the zero trust security model, which focuses on real-time security monitoring, the enforcement of continuous identity validation, and the concept of least privilege, is gradually becoming considered as a relevant strategy for addressing such risks. In assessing organisational
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Trust by the way of security"

1

Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.

Full text
Abstract:
While not uncontested, the finding that liberal democracies rarely, if ever, fight wars against each other represents one of the seminal discoveries of international relations (IR) scholarship. Nevertheless, 'democratic peace theory' (DPT) – the body of scholarship that seeks to explain the democratic peace finding – still lacks a satisfactory explanation for this phenomenon. In this thesis, I argue that a primary source of this failure has been DPT's failure to recognize the importance of collective identification and trust for the eventuation of the 'liberal peace'. Building on existing DPT
APA, Harvard, Vancouver, ISO, and other styles
2

Manor, Mike. "The home front : civil rights, American values, and public trust when America is at war /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=cfa77bfd-34c7-403f-9f65-cbb4037fa454&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lemaitre, Freddy. "La monnaie comme objet de sûretés." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020044.

Full text
Abstract:
Partant du constat que l’affectation en garantie de la monnaie est aujourd’hui susceptible de revêtir de multiples qualifications et d’obéir à des régimes tout aussi divers, selon que la monnaie est analysée comme un bien corporel ou incorporel et selon que les sommes affectées en garantie sont ou non confondues dans le patrimoine du créancier, cet essai propose d’adopter une conception unifiée de la monnaie susceptible de la soumettre à un régime simplifié d’affectation en garantie qui, sans faire fi de l’irréductible dualité tenant au caractère individualisé ou non des sommes d’argent, est a
APA, Harvard, Vancouver, ISO, and other styles
4

Gilberg, Ole Rasmus. "Cloud Security without Trust." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26713.

Full text
Abstract:
The usage of cloud services is increasing for each day. This applies to private persons which store pictures and documents, as well as bigger corporations whom outsource parts of, or all, handling of their ICT infrastructure to cloud providers. Despite the continuous increase in application, there are still substantial security concerns among current and potential cloud users. Much of the concerns are due to lack of transparency to how the cloud providers maintain and process the user data. Motivated by this, multiple cryptographic schemes has been proposed to provide users with confidence tha
APA, Harvard, Vancouver, ISO, and other styles
5

Karthik, Krishna FNU. "Vehicular Security using Trust Management." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2740.

Full text
Abstract:
The emerging concept of vehicular platooning with trust is a promising solution to deal with ever-growing computational and communication demands of connected vehicles. The most important concept introduced in any technology is trust, this has previously been imbibed into the platoon with the use of a centralized trust evaluating infrastructure. The introduction of trust evaluation using a decentralized model is not in widespread use, which makes it a challenging task to be included in the fast-varying feature of vehicular environment. This thesis discusses incorporation of a decentralized tr
APA, Harvard, Vancouver, ISO, and other styles
6

Leonhard, Julian. "Analog hardware security and trust." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS246.

Full text
Abstract:
La mondialisation et la spécialisation de la chaîne d'approvisionnement des circuits intégrés (CI) ont conduit les entreprises de semi-conducteurs à partager leur précieuse propriété intellectuelle (PI) avec de nombreuses parties pour les faire fabriquer, tester, etc. En conséquence, les PI et les CI sensibles sont exposés à des parties potentiellement malveillantes, ce qui entraîne de graves menaces de piratage telles que la contrefaçon ou la retro ingénierie. Dans cette thèse, nous développons des méthodes pour sécuriser les IP/CI analogiques et mixtes contre les menaces de piratage dans la
APA, Harvard, Vancouver, ISO, and other styles
7

Bilgic, Ali. "Transcending Europe's immigration security dilemma : security, trust, and hospitality." Thesis, Aberystwyth University, 2010. http://hdl.handle.net/2160/452c3109-1597-4d36-ac4a-7392183a7c1a.

Full text
Abstract:
The thesis aims to develop a theoretical perspective for studying illegal protection-seeking migration, and possible responses to this movement adopted by the receiving communities. Using the security dilemma as the framework of analysis, the discussion will be conducted through the theoretical perspective provided by emancipatory security theory. The thesis has three parts. In Part I, the insecurity experienced by illegal sub-Saharan protection-seekers during their journey will be analyzed based on some accounts publicized by various civil society organizations. Part II will develop the theor
APA, Harvard, Vancouver, ISO, and other styles
8

Elsalamouny, Ehab M. "Probablistic trust models in network security." Thesis, University of Southampton, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.536340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

El, Salamouny Ehab. "Probabilistic trust models in network security." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/179163/.

Full text
Abstract:
One of the dominant properties of a global computing network is the incomplete information available to principals about each other. This was the motivation of using the notion of probabilistic trust as an approach to security sensitive decision making in modern open and global computing systems. In such systems any principal A uses the outcomes of past interactions with another principal B to construct a probabilistic model approximating the behaviour of B. Using this model, the principal A can take decisions regarding interactions with B by estimating its future actions. Many existing framew
APA, Harvard, Vancouver, ISO, and other styles
10

Poirrier, Alexandre. "Formal Security of Zero Trust Architectures." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAX050.

Full text
Abstract:
La sécurité des systèmes d'information repose traditionnellement sur le modèle de sécurité du périmètre, qui compartimentalise le réseau en différents périmètres isolés qui regroupent les ressources. Un système accède à un périmètre en s'authentifiant, et une fois au sein d'un périmètre, il est implicitement considéré comme étant de confiance, jouissant d'un accès non restreint à toutes les ressources de ce périmètre. Cependant, de nombreuses attaques envers les architectures périmétriques ont montré les limites de cette confiance. De plus, la transformation des systèmes d'information, par exe
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Trust by the way of security"

1

Bacevich, A. J. Breach of trust: How Americans failed their soldiers and their country. Metropolitan Books, Henry Holt and Company, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Börsch-Supan, Axel. The German public pension system: How it was, how it will be. National Bureau of Economic Research, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Börsch-Supan, Axel. The German public pension system: How it was, how it will be. National Bureau of Economic Research, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Garbis, Jason, and Jerry W. Chapman. Zero Trust Security. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roman, Rodrigo, and Jianying Zhou, eds. Security and Trust Management. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-91859-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Katsikas, Sokratis K., and Cristina Alcaraz, eds. Security and Trust Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01141-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barthe, Gilles, Evangelos Markatos, and Pierangela Samarati, eds. Security and Trust Management. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46598-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jøsang, Audun, Pierangela Samarati, and Marinella Petrocchi, eds. Security and Trust Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38004-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Accorsi, Rafael, and Silvio Ranise, eds. Security and Trust Management. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41098-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sklavos, Nicolas, Ricardo Chaves, Giorgio Di Natale, and Francesco Regazzoni, eds. Hardware Security and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-44318-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Trust by the way of security"

1

Singh, Rajiv Ranjan, José Moreira, Tom Chothia, and Mark D. Ryan. "Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties." In Security and Trust Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59817-4_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fischer-Hübner, Simone, and Farzaneh Karegar. "Addressing Challenges: A Way Forward." In Synthesis Lectures on Information Security, Privacy, and Trust. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-54158-2_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wazan, Ahmad Samer, Romain Laborde, David W. Chadwick, François Barrere, and AbdelMalek Benzekri. "Which Web Browsers Process SSL Certificates in a Standardized Way?" In Emerging Challenges for Security, Privacy and Trust. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01244-0_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Golia, Silvia. "Trust and security in Italy." In Proceedings e report. Firenze University Press and Genova University Press, 2023. http://dx.doi.org/10.36253/979-12-215-0106-3.42.

Full text
Abstract:
Starting from 2018, the European University Institute’s European Governance and Politics Programme developed an international survey in order to monitor the development of Solidarity in Europe. The text of the survey changed across the four available waves, but there were sections remained unchanged over the years, that is the ones concerning security (how secure or insecure do you feel about each of the following areas?) and trust in national government and European Union (how much do you trust … to make things better in the following area?). The interesting thing in these three sections is t
APA, Harvard, Vancouver, ISO, and other styles
5

Chiru, Irena, Cristina Ivan, and Silviu Paicu. "Reforming Intelligence in Ukraine: The Past, Present, and Future." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-66434-2_17.

Full text
Abstract:
AbstractThis chapter looks at the evolution of institutional frameworks and processes related to intelligence in Ukraine. By using the methodology provided to reform intelligence in new democracies, it analyzes the institutional changes within the intelligence services and the initiatives aiming to enforce coordination, improve professionalism, transparency, and trust—as crucial norms for intelligence under democracy. Within this comprehensive framework, it aims to investigate the mechanisms in place to ensure that intelligence services conduct intelligence activities in a manner that achieves
APA, Harvard, Vancouver, ISO, and other styles
6

Bonura, Susanna, Davide dalle Carbonare, Roberto Díaz-Morales, Ángel Navia-Vázquez, Mark Purcell, and Stephanie Rossello. "Increasing Trust for Data Spaces with Federated Learning." In Data Spaces. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98636-0_5.

Full text
Abstract:
AbstractDespite the need for data in a time of general digitization of organizations, many challenges are still hampering its shared use. Technical, organizational, legal, and commercial issues remain to leverage data satisfactorily, specially when the data is distributed among different locations and confidentiality must be preserved. Data platforms can offer “ad hoc” solutions to tackle specific matters within a data space. MUSKETEER develops an Industrial Data Platform (IDP) including algorithms for federated and privacy-preserving machine learning techniques on a distributed setup, detecti
APA, Harvard, Vancouver, ISO, and other styles
7

Park, Eun G. "Trust in Virtual Communities." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch165.

Full text
Abstract:
Trust is one of the key factors that emerged as a significant concept in virtual communities. Trust is so complicated that it is hard to define in one standardized way. Trust issues have evolved into two major ways in the fields of virtual community and security. Among a huge literature concerning trust in virtual communities, a majority of literature addresses technical solutions on trust-building by providing new Web-based applications. They range from human users authorization, semantic Web, agent technologies and access control of network to W3C standardization for content trust and securi
APA, Harvard, Vancouver, ISO, and other styles
8

Vashishth, Tarun Kumar, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, and Rajneesh Panwar. "Enhancing Cloud Security." In Improving Security, Privacy, and Trust in Cloud Computing. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-1431-9.ch004.

Full text
Abstract:
Cloud computing has revolutionized the way organizations store, process, and manage data, offering flexibility and scalability. However, the rise in cyber threats poses significant challenges to maintaining robust cloud security. This chapter delves into the pivotal role that Artificial Intelligence (AI) and Machine Learning (ML) play in enhancing cloud security. By harnessing the capabilities of AI and ML, organizations can proactively detect, mitigate, and respond to evolving cyber threats, ultimately fortifying their cloud infrastructure.AI-driven techniques empower security systems to reco
APA, Harvard, Vancouver, ISO, and other styles
9

Brosso, Ines, and Alessandro La Neve. "Information Security Management Based on Adaptive Security Policy Using User Behavior Analysis." In Strategic and Practical Approaches for Information Security Governance. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0197-0.ch019.

Full text
Abstract:
This chapter presents a system for information security management based on adaptative security policy using user’s behavior analysis in Information Technology. This system must be able to acquire information about the environment, space, time, equipment, hardware, and software. This information is used in the user behavior analysis. This work proposes that, based on the evidence of the user behavior, it is possible to trust or not trust the user. Levels of trust are released according to the user behavior and the rules that were previously established for the parameters, which help to establi
APA, Harvard, Vancouver, ISO, and other styles
10

Oermann, Andrea, and Jana Dittmann. "Trust in E-Technologies." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch209.

Full text
Abstract:
When reflecting the term trust, there are two main hypotheses which can be found in most of the literature: First, trust is presented as an amorphous phenomenon, which is difficult to measure empirically (Endress, 2002). Second, the characteristic of trust is rather fragile. Trust as a mediator of social interactions cannot be quantified precisely, it has to be generated and recreated at any time varying with its social context. Volken summarizes this particular connection between trust and the context in which it is created: “Trust is a complex construct with multiple dimensions, and their re
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trust by the way of security"

1

Yang, Zhihuan, Wenlong Tian, Ruixuan Li, Xuming Ye, and Zhiyong Xu. "Who Owns the Cloud Data? Exploring a non-interactive way for secure proof of ownership." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alfieri, Costanza, Suriya Ganesh, Limin Ge, Jingxin Shi, and Norman Sadeh. "“I was Diagnosed with …”: Sensitivity Detection and Rephrasing of Amazon Reviews with ChatGPT." In 2024 21st Annual International Conference on Privacy, Security and Trust (PST). IEEE, 2024. https://doi.org/10.1109/pst62714.2024.10788076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pélissier, Samuel, Gianluca Anselmi, Abhishek Kumar Mishra, Anna Maria Mandalari, and Mathieu Cunche. "Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?" In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

R, Sreelatha, and Abhay Yelsangiker. "Zero Trust Security Architecture." In 2024 Recent Advances in Sustainable Engineering and Future Technologies (RASEFT). IEEE, 2024. https://doi.org/10.1109/raseft61414.2024.00034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ries, Sebastian, Marc Fischlin, Leonardo A. Martucci, and Max Muuhlhauser. "Learning Whom to Trust in a Privacy-Friendly Way." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Feng, Huan, and Kang G. Shin. "Masquerade of mobile applications: Introducing unlinkability in a practical way." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906937.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hoa, Huynh Van, Chan Dai Truyen Thai, Nguyen Thi Yen Linh, and Vo Nguyen Quoc Bao. "Security for Selected Two-Way Relay with Different Trust Degrees and Friendly Jammers." In 2021 International Conference on Advanced Technologies for Communications (ATC). IEEE, 2021. http://dx.doi.org/10.1109/atc52653.2021.9598201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ly, Stephen, and Yuan Cheng. "A Data-based Protocol for One-way Trust in Inter-vehicular Communication." In CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy. ACM, 2021. http://dx.doi.org/10.1145/3445969.3450430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Muqian, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, and Binxing Fang. "Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liang, Shan, Yuewu Wang, Lingguang Lei, Jiwu Jing, and Quan Zhou. "SecureESFS: Sharing Android External Storage Files in a Securer Way." In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2020. http://dx.doi.org/10.1109/trustcom50675.2020.00180.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Trust by the way of security"

1

Deitelhoff, Nicole, Rainer Forst, Vinzenz Hediger, and Tobias Wille. Trust in conflict : notes on a research program. ConTrust - Trust in Conflict. Research Centre "Normative Orders" of Goethe University Frankfurt am Main, 2025. https://doi.org/10.21248/gups.90950.

Full text
Abstract:
The ConTrust research initiative challenges the conventional wisdom that trust is antithetical to conflict. Instead, ConTrust posits that under certain social and institutional conditions, trust can also emerge in and through conflict. To lay the groundwork for this agenda, this working paper develops a basic concept of trust that is the foundation for more specific conceptions of trust. Furthermore, it distinguishes between justified and unjustified trust, introduces a notion of social integration through conflict, highlights the role of uncertainty and crisis in contemporary trust dynamics,
APA, Harvard, Vancouver, ISO, and other styles
2

Flagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/20200051.

Full text
Abstract:
U.S. research security requires trust and collaboration between those conducting R&D and the federal government. Most R&D takes place in the private sector, outside of government authority and control, and researchers are wary of federal government or law enforcement involvement in their work. Despite these challenges, as adversaries work to extract science, technology, data and know-how from the United States, the U.S. government is pursuing an ambitious research security initiative. In order to secure the 78 percent of U.S. R&D funded outside the government, authors Melissa Flagg
APA, Harvard, Vancouver, ISO, and other styles
3

Artis, Roslyn, Connie Ledoux Book, Jennifer Clinton, John S. Lucas, James P. Pellow, and Dawn Michele Whitehead. Advancing Global Stability and U.S. National Security through Peaceful Exchange. The International Coalition (coordinated by The Forum on Education Abroad), 2021. http://dx.doi.org/10.36366/ic.agsausnstpe.03312021.

Full text
Abstract:
For nearly 100 years, American leadership, regardless of political affiliation, has recognized the vital importance of people-to-people international exchange programs in bolstering our nation’s economy, strengthening our national security, and improving America’s status in the world. In today’s interconnected world, where global challenges require global cooperation on solutions, the United States should not retreat from international engagement, but should rather double our efforts to build positive and mutually supportive connections with our neighbors. America must embrace its role in lead
APA, Harvard, Vancouver, ISO, and other styles
4

Armstrong, Beth, Lucy King, Robin Clifford, and Mark Jitlal. Food and You 2 - Wave 2. Food Standards Agency, 2021. http://dx.doi.org/10.46756/sci.fsa.dws750.

Full text
Abstract:
Food and You 2 is a biannual survey which measures self-reported consumer knowledge, attitudes and behaviours related to food safety and other food issues amongst adults in England, Wales, and Northern Ireland. The survey is primarily carried out online using a methodology known as ‘push-to-web’. Fieldwork was conducted between 20 November 2020 and 21 January 2021. A total of 5,900 adults from 3,955 households across England, Wales and Northern Ireland completed the survey. Topics covered in the Food and You 2: Wave 2 Key Findings report include: Trust in FSA and the food supply chain Concerns
APA, Harvard, Vancouver, ISO, and other styles
5

Armstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 6 Key Findings. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.djj797.

Full text
Abstract:
Food and You 2 is a biannual ‘Official Statistic’ survey commissioned by the Food Standards Agency (FSA). The survey measures consumers’ self-reported knowledge, attitudes and behaviours related to food safety and other food issues amongst adults in England, Wales, and Northern Ireland. Fieldwork for Food and You 2: Wave 6 was conducted between 12 October 2022 and 10 January 2023. A total of 5,991 adults (aged 16 years or over) from 4,217 households across England, Wales, and Northern Ireland completed the ‘push-to-web’ survey. The modules presented in this report include ‘Food you can trust’,
APA, Harvard, Vancouver, ISO, and other styles
6

Armstrong, Beth, Lucy King, Robin Clifford, et al. Food and You: Wave 5. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.fqq357.

Full text
Abstract:
Food and You 2 is a biannual survey which measures self-reported consumer knowledge, attitudes and behaviours related to food safety and other food issues amongst adults in England, Wales, and Northern Ireland. The survey is primarily carried out online using a methodology known as ‘push-to-web’. Fieldwork was conducted between 26 April and 24 July 2022. A total of 6,770 adults from 4,727 households across England, Wales and Northern Ireland completed the survey. Topics covered in the Food and You 2: Wave 5 Key Findings report include: food you can trust concerns about food food security food
APA, Harvard, Vancouver, ISO, and other styles
7

McFee, Erin. Research Brief: Environmental Peacebuilding with Formerly Armed Actors. Trust After Betrayal, 2024. http://dx.doi.org/10.59498/21970.

Full text
Abstract:
Environmental Peacebuilding (EPB) is an approach seeking to leverage shared environmental challenges in conflict zones to foster cooperation, trust, and sustainable peace. This Research Brief highlights the potential role of formerly armed actors (FAAs) as key stakeholders in this process, positing that, under specific conditions, they can be leaders in restorative actions for enduring conflict transformation and security building. It also addresses crucial concerns in implementing EPB like the depoliticisation of its processes, displacement of populations, the deligimisation of the state and
APA, Harvard, Vancouver, ISO, and other styles
8

Armstrong, Beth, Lucy King, Robin Clifford, et al. Food and You 2: Wave 7 Key Findings. Food Standards Agency, 2024. http://dx.doi.org/10.46756/sci.fsa.qqj935.

Full text
Abstract:
Food and You 2 is a biannual ‘Official Statistic’ survey commissioned by the Food Standards Agency (FSA). The survey measures consumers’ self-reported knowledge, attitudes and behaviours related to food safety and other food issues amongst adults in England, Wales, and Northern Ireland. Fieldwork for Food and You 2: Wave 7 was conducted between 23rd April 2023 to 10th July 2023. A total of 5,812 adults (aged 16 years or over) from 4,006 households across England, Wales, and Northern Ireland completed the ‘push-to-web’ survey (see Annex A for more information about the methodology). The modules
APA, Harvard, Vancouver, ISO, and other styles
9

Vilalta Perdomo, Carlos J. Determinant Factors in the Perception of Crime-Related Insecurity in Mexico. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0011448.

Full text
Abstract:
What determines the feeling of insecurity with respect to crime and what can be done about it? This study proposes and tests a correlational model that combines different theoretical determinants of insecurity and the fear of crime. The test was carried out both in the country as a whole and in the Mexico City Metropolitan Area. The sources of information are the National Victimization Survey and Perception on Public Security (ENVIPE) of 2011 and the Victimization Survey and Institutional Effectiveness (ENVEI) of August 2010 and January 2011. The findings suggest that actions to promote civili
APA, Harvard, Vancouver, ISO, and other styles
10

Oshio, Takashi. Social Security and Trust Fund Management. National Bureau of Economic Research, 2004. http://dx.doi.org/10.3386/w10444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!