Siga este link para ver outros tipos de publicações sobre o tema: Trust by the way of security.

Artigos de revistas sobre o tema "Trust by the way of security"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Trust by the way of security".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Wang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.

Texto completo da fonte
Resumo:
IoT security is a combination of physical device security and network security. The objective of the IoT security module is to hide the network from communication vulnerabilities between the transmitter module and the server. Also, the security algorithms are designed to protect the systems from software attacks and physical hardware attacks. The paper explores the ongoing advancements and research in the field of IoT security by analyzing the research limitations and issues of the existing models. The research gaps identified from the literature analysis explores the way where the research on
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.

Texto completo da fonte
Resumo:
Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model w
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.

Texto completo da fonte
Resumo:
Customer disposition to data, nature of the information on site, protection<strong> </strong>concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest and will not harm you, or something is safe and reliable is called trust; while security is an attempt to safeguard the data from unauthorized access. Information security is a vital management as well as technical requir
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Zhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.

Texto completo da fonte
Resumo:
The article analyzes the influence of the social network on humanity. For many years, humanity has realized even in social networks the need for psychological security. Social media confrontation is psychological warfare on a virtual level. Expecting negative information on a social network, people communicate only with friends, like-minded people. Communication on the social network has intensified over the past three years, due to the pandemic in the world, minimal contact has entered the way of life of mankind. Nevertheless, any positive and negative information can affect the psychological
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Najib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.

Texto completo da fonte
Resumo:
In the rapidly growing and increasingly complex Internet of Things (IoT) ecosystem, securing communication and data exchanges between devices is a major concern. To address this, we proposed QS-Trust, a trust-based security model considering both Quality of Service (QoS) and social parameters. QS-Trust uses a trust value to determine the trust level between devices and employs a QoS-aware trust-based algorithm to improve the security of data transmissions. Additionally, the model incorporates intelligence parameters such as computing power, memory capacity, device behavior and context informat
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.

Texto completo da fonte
Resumo:
The purpose of this study is to analyze the factors that influence the information security compliance intention of Korean military officers. For this purpose, a research model was constructed focusing on information security compliance attitude and perceived control, which are the main variables of the theory of planned behavior. In addition, security sensitivity, organization trust, information security work impediment, and sanction, were selected as independent variables. The research model was analyzed through a survey targeting Korean army officers, and the results are as follows. First,
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Orkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.

Texto completo da fonte
Resumo:
Abstract Nowadays, businesses are building bottomless real-time connections with their customers, suppliers, partners, and governments, collecting and selectively sharing huge amounts of data. The value of stored and in-transit information is rising rapidly, driving new markets and generating a need for securely connecting devices and delivering trusted data. Data integrity is a vital component in economy which can pertain to individuals, companies, governments and globally. It is a measure of the validity and reliability of a data. While internal audit has taken some steps toward keeping up w
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Venkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.

Texto completo da fonte
Resumo:
Zero Trust Software-Defined Wide Area Network (SD-WAN) technology has emerged as a critical solution for the healthcare industry undergoing digital transformation. This architecture adopts a "never trust, always verify" article that fundamentally differs from traditional perimeter-based security models, making it particularly valuable in healthcare environments where diverse stakeholders require varying access to sensitive data. The implementation of Zero Trust SD-WAN delivers multiple benefits for healthcare organizations, including enhanced security through identity verification, continuous
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Surendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.

Texto completo da fonte
Resumo:
The current research paper assesses the financial and operational impacts of enforcing zero-trust security models in financial planning systems. As the risk of cyberattacks intensifies and the regulations become unexpectedly complicated, these groups are in a desperate search for a comprehensive security system. As such, the zero trust security model, which focuses on real-time security monitoring, the enforcement of continuous identity validation, and the concept of least privilege, is gradually becoming considered as a relevant strategy for addressing such risks. In assessing organisational
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Cao, Xiao Mei, Hai Tao Zhu, He Yang Shen, and Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network." Applied Mechanics and Materials 462-463 (November 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.

Texto completo da fonte
Resumo:
Trust problem is a key issue for Mobile P2P (MP2P) network security. In MP2P network, terminals addressing mode, communication way and display identifier are different to traditional P2P network. Some security issues such as: malicious slander and collusion, free ride phenomenon, are even more serious compared to traditional P2P network. Aimed at these above issues, a Proxy-based Security-Feedback Trust Model (PSTM) is proposed. Different types of terminals access to different proxy servers to shield the discrepancy between different terminal equipments on MP2P equipment access network layer.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Siriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.

Texto completo da fonte
Resumo:
Hardware security in the cyber security domain had become a more of a controversial topic over the past decade due to the introduction of new design technologies in semiconductors and expansion of global supplier chains. In proportion to the technological advancement of hardware production, the success rate of the existing hardware attacks had also evolved over the time with a significantly high rate of emergence of new attacking techniques and methods. Computing hardware is becoming a more and more attractive attack surface due to several reasons. The technology of analyzing the hardware comp
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Kumawat, Shyamlal, and Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, no. 2 (2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.

Texto completo da fonte
Resumo:
Cloud computing is a new paradigm in which dynamically scalable virtualized computing resources, services and information are provided as a service among the people and organizations across the globe over the Internet. The recent developments in cloud computing technology placed numerous challenges in the field of Cloud Computing, including data replication, consistency, reliability, availability and scalability of cloud resources, portability, trust, security, and privacy. Still most of the organizations are not adapting cloud computing due to lack of trust on service provider. This paper giv
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Basco-Galangco, R. B., and D. L. Chinayo. "The State of Police Legitimacy Through the People's Trust and Satisfaction in the Performance of the Police of Their Duties." American Journal of Multidisciplinary Research and Innovation 1, no. 6 (2022): 47–55. https://doi.org/10.54536/ajmri.v1i6.872.

Texto completo da fonte
Resumo:
People are likely to cooperate with the police when they view their authority as legitimate. Police legitimacy is established by the people’s trust in them and the people’s satisfaction in the way they perform their duties. This study surveyed and correlated the community people’s trust and satisfaction in the police’s performance of their duties. There were 2,381 respondents from the different provinces of the Cordillera Administrative Region, Philippines, who participated in the survey. The respondents moderately trust the police and were much satisfied with the way t
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Ragul, M., A. Aloysius, and V. Arulkumar. "Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation." Indian Journal Of Science And Technology 18, no. 7 (2025): 526–38. https://doi.org/10.17485/ijst/v18i7.3783.

Texto completo da fonte
Resumo:
Objectives: The research presents Dynamic Trust Evaluation (DTEF) as a blockchain-powered framework for IoT security which implements real-time assessment of trust while adapting policies and detecting anomalies. The system intends to overcome scalability and privacy problems that result from operating large-scale IoT networks. Methods: Secure trust evaluations and blockchain network policy enforcement is made possible through the integration of Attribute-Based Access Control (ABAC) and Elliptic Curve Digital Signature Algorithm (ECDSA) within DTEF. Performance evaluation was conducted by test
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Revanth P S B.E. "Blockchain-Secured and VPN Integrated Power Systems Management." Dandao Xuebao/Journal of Ballistics 37, no. 1 (2025): 25–34. https://doi.org/10.52783/dxjb.v37.166.

Texto completo da fonte
Resumo:
Integration VPN and blockchain technology for power system management provides a transformative approach to the user by addressing obstacles of data security transparency and efficiency with the help of decentralized energy grids. As a modern power system, it enhances its dependency on distributed renewable energy sources and integrated smart grids which require robust protection of data and operation integrity. Blockchain provides a decentralized immutable laser for securely recording energy transaction monitoring performance and protecting from unauthorized access. This ensures transparency
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Sreevidya, B., and Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.

Texto completo da fonte
Resumo:
Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. While incorporating data secur
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

El-Sayed, Hesham, Sharmi Sankar, Heng Yu, and Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs." International Journal of Computers Communications & Control 12, no. 5 (2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.

Texto completo da fonte
Resumo:
In the recent years, Heterogeneous Distributed Networks (HDNs) is a predominant technology implemented to enable various application in different fields like transportation, medicine, war zone, etc. Due to its arbitrary self-organizing nature and temporary topologies in the spatial-temporal region, distributed systems are vulnerable with a few security issues and demands high security countermeasures. Unlike other static networks, the unique characteristics of HDNs demands cutting edge security policies. Numerous cryptographic techniques have been proposed by different researchers to address t
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Pavlidis, Michalis, Haralambos Mouratidis, and Shareeful Islam. "Modelling Security Using Trust Based Concepts." International Journal of Secure Software Engineering 3, no. 2 (2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.

Texto completo da fonte
Resumo:
Security modelling and analysing not only require solving technical problems but also reasoning on the organization as a whole for the development of a secure system. Assumptions exist about trust relationships among actors within the system environment, which play an important role in modelling and analysing security. Such assumptions are critical and must be analysed systematically for ensuring the overall system security. In this paper, the authors introduce trust-based concepts to identify these trust assumptions, and integrate the trust concepts with security concepts for the development
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Xu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (2023): 782. http://dx.doi.org/10.3390/electronics12040782.

Texto completo da fonte
Resumo:
Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location/user attributes as the sole basis for the trust assessment. However, due to the fine-grained verification of identity under the zero-trust security architecture, there is a need for multiple authentication and authorization processes. If a single policy engine has unknown vulnerabilities and unknown backdoors to be maliciously attacked, or DDOS at
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Yan, Ye, and Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective." Sustainability 10, no. 7 (2018): 2495. http://dx.doi.org/10.3390/su10072495.

Texto completo da fonte
Resumo:
With the new round of global nuclear issues, the populace’s emotion has been tensed and discomposure has been trigged off. To accurately understand the sense of nuclear safety & security for the Chinese public and ensure that the government makes reasonable decisions regarding nuclear issues, a special questionnaire and evaluation has been carried out. With the use of the principles for sociology of security, the methods of questionnaires and SPSS, a three-dimension assessment system, which consists of knowledge and experience, internal, and external trust, and the way of perception, was c
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Zhi, Kuiyun, Qiurong Tan, Si Chen, et al. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.

Texto completo da fonte
Resumo:
Several studies have found that trust in government is associated with social fairness, citizens’ satisfaction with public service, and life satisfaction. This study aimed to investigate the serial mediation effects of social security satisfaction and life satisfaction on the association between social security fairness and trust in government. We analyzed the data from the Chinese Social Survey in 2019 (n = 7403) to examine the serial mediation effects. The findings showed that the higher the level of government, the greater the trust it enjoyed from its citizens. The direct prediction of tru
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Dr., Namita Mittal. "User Perceptions of Privacy and Security in Online Social Networks." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 91–94. https://doi.org/10.5281/zenodo.7547576.

Texto completo da fonte
Resumo:
User perceptions of privacy and security on online social networks is a complex issue that encompasses various factors such as awareness of privacy settings, trust in the platform, use of third-party apps and services, attitudes towards data collection and usage, response to privacy breaches, perception of misinformation, and usage of privacy-enhancing tools. This can greatly influence the way they interact with the platform. Users' reaction to privacy breaches, perception of misinformation, and usage of privacy-enhancing tools can also greatly impact their trust and behavior on the platfo
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Joshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.

Texto completo da fonte
Resumo:
bstract: Cloud computing environment is a new way in which web base enable applications provide as a service for the users with low computational cost through internet. As we store data and it also provide services in distributed environment. Cloud ease its users byproviding virtualization technology of resources through internet. Cloud computing is the emerging field, due to this reason the various new techniques are still developing. At current scenario new security challenges were increases for cloud professionals. Due to lack of security in cloud computing environment user of cloud lost it
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Sun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.

Texto completo da fonte
Resumo:
Purpose – As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security thr
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Almarri, Seetah, and Ahmed Aljughaiman. "Blockchain Technology for IoT Security and Trust: A Comprehensive SLR." Sustainability 16, no. 23 (2024): 10177. http://dx.doi.org/10.3390/su162310177.

Texto completo da fonte
Resumo:
After the emergence of the Internet of Things (IoT), the way devices interact with each other changed, as it allowed automation and seamless communication in various fields. However, various challenges related to security and trust have emerged, hindering the widespread adoption of the IoT. Blockchain technology is considered the ideal solution to face these challenges because of its immutable and decentralized nature. This paper explores the potential of blockchain technology to address critical security and trust challenges within the rapidly growing IoT ecosystem. Through a systematic liter
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Manalu, Ignasius Falentino, Basrah Saidani, and Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta." Jurnal Bisnis, Manajemen, dan Keuangan 3, no. 1 (2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.

Texto completo da fonte
Resumo:
This study aims to explain a comprehensive model that explains the impact of perceived security and perceived ease of use in influencing intention to use and how they contribute through trust in the context of using digital payment applications in Jakarta. The purpose of this study is to analyze the effect of perceived security on trust, the effect of perceived ease of use on trust, the effect of perceived security on intention to use, the effect of perceived ease of use on intention to use, the effect of trust on intention to use, the effect of perceived security on intention to use through t
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Singh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.

Texto completo da fonte
Resumo:
This paper examines the users’ perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the technological and industrial approaches to security. The user-centered research on banking was conducted at the Royal Melbourne University of Technology University and Griffith University, both of which are part of the Smart Internet Technology Cooperative Research Centre. We conclude that the most effective way to increase the perception of Internet banking security is to increase ease of use, convenience, personalisation and
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Curtis, Shelby R., Jessica Rose Carre, and Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach." Managerial Auditing Journal 33, no. 4 (2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.

Texto completo da fonte
Resumo:
Purpose The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact the perceptions of companies in the presence or absence of a past security breach. Design/methodology/approach The study exposed participants to three types of security statements and randomly assigned them to the presence or absence of a previous breach. Participants then evaluated the company and generated a hypothetical password for that company. Findings This study found that the presence or absence of a pr
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Usman, Aminu Bello, William Liu, Quan Bai, and Ajit Narayanan. "Trust of the Same." International Journal of Information Security and Privacy 9, no. 2 (2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.

Texto completo da fonte
Resumo:
Trust and reputation management represents a significant trend in tackling the emerging security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores. Homophily i.e., love of the same, is the tendency of individuals to associate and bond with similar others mentioned in the social network, and the authors have discovered its presence, in term of nodes' attributes, in studying trust and reputation behaviors for the P2P oriented next generation of WSN. The simulation studies have confirmed the structural homop
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Negi, Shalabh, and Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.

Texto completo da fonte
Resumo:
Management of trust is one of the most challenging parts in cloud computing. Cloud service’s features such as distributed, dynamic and nontransparentintroduces several challenges for availability, privacy, and security. A method is proposed to have trust as a service between cloud serviceprovider and customer by creating a cloud armor. This proposed methodology is used to make cloud server end and customer end system secure ofany intrusion to their privacy. In this methodology, we will have a user usage pattern log as ever user has its own unique way of using his/her system;hence, in case if a
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Lalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.

Texto completo da fonte
Resumo:
MANETs are substantially more defenseless to different attacks due to receptiveness in network topology and being endless of a preferred performance in the network. As a result of that, more malicious nodes are regularly intruding without being recognized from the network topology. MANET needs exceptionally particular security techniques to detach the false passage. Also, no single solution is fit into various sorts of the network. The networks perform admirably if the nodes are trusty and act appropriately helpfully. The goal is to enhance the security of the network. This paper begins the ne
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Ola, Adegboyega Adedolapo. "Electoral Violence and Arms Proliferation in Nigeria: Causes, Consequences and Way Forward." African Journal of Stability and Development (AJSD) 11, no. 2 (2018): 446–59. http://dx.doi.org/10.53982/ajsd.2018.1102.13-j.

Texto completo da fonte
Resumo:
One of the greatest challenges facing governance and political systems in Africa is the violence that ensues whenever elections are conducted. The main objective of the study was to examine the relationship between electoral violence and arms proliferation in Nigeria. It also examines the causes and implications of electoral violence on the electorate, entire community and Nigeria’s political system. The adopted research methodology is desktop research, where information was obtained from journals, textbooks, conference papers and others. The findings of the study revealed a link between small
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Cvetković, Vladimir M., Milan Lipovac, Renate Renner, Svetlana Stanarević, and Zlatko Raonić. "A Predictive Framework for Understanding Multidimensional Security Perceptions Among Students in Serbia: The Role of Institutional, Socio-Economic, and Demographic Determinants of Sustainability." Sustainability 17, no. 11 (2025): 5030. https://doi.org/10.3390/su17115030.

Texto completo da fonte
Resumo:
This study investigates and forecasts multidimensional security perceptions among Serbian university students, who are a particularly engaged and vulnerable demographic in transitional societies. It examines how demographic traits, socio-economic status, and levels of institutional trust and engagement shape students’ evaluations of security in everyday life. The study examines six primary dimensions of security perception: personal safety, safety at public events and demonstrations, perceived national threats, digital security and privacy, perception of emergencies and crises, and trust in in
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Nurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.

Texto completo da fonte
Resumo:
This research aims to understand the Influence of security, privacy, and reputation toward trust in online shopping consumer. The purpose of this research are: (1) the effect of security toward trust in online shopping consumer, (2) The effect of privacy toward trust in online shopping consumer, (3) The effect of reputation toward trust in online shopping consumer, (4) The effect of security, privacy, and reputation toward trust in online shopping consumer. The type of research used in this study was a causal quantitative research. The population in this study was citizens of Padang city, that
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Jagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.

Texto completo da fonte
Resumo:
The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can b
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Wenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination." Review of European Administrative Law 13, no. 3 (2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.

Texto completo da fonte
Resumo:
This article looks into the meaning of the concepts of sincere cooperation, mutual trust, and mutual recognition in EU social security coordination. It analyses the legislative choice of coordination as the main regulatory mechanism in the field, and examines the role of administrative cooperation. Furthermore, the article highlights the challenges that arise in situations where mutual recognition is required under the Regulations, as in connection with portable documents relating to the posting of workers. It also considers the limits to mutual trust via the principle of prohibition of fraud
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Khuspe, Snehal Tukaram. "A Study on the Impact of Cybersecurity Threats on Consumer Trust in E-Commerce: A Case of Navi Mumbai." International Journal of Economics, Business, Accounting, Agriculture and Management towards Paradigm Shift in Research (IJEBAMPSR) 2, no. 1 (2025): 172–76. https://doi.org/10.5281/zenodo.15294244.

Texto completo da fonte
Resumo:
<em>Abstract</em> <em>The rapid expansion of e-commerce has revolutionized the way consumers engage in online transactions. However, cybersecurity threats such as data breaches, phishing attacks, identity theft, and online fraud have significantly impacted consumer trust. This study investigates the relationship between cybersecurity threats and consumer trust in e-commerce within Navi Mumbai. The research aims to analyze consumer awareness, the impact of security breaches on purchasing decisions, and the effectiveness of security measures adopted by e-commerce platforms. The findings suggest
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Kapse, Smita, Latesh Malik, and Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS." ASEAN Engineering Journal 14, no. 2 (2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.

Texto completo da fonte
Resumo:
Blockchain deployments require efficient consensus models in order to be scaled for larger networks. Existing consensus models either use stake-levels, trust-levels, authority-levels, etc. or their combinations in order to reduce mining delay while maintaining higher security levels. But these models either have higher energy requirements, lower security, or have linear/exponential relationship between mining delay and length of the chains. Due to these restrictions, the applicability of these models is affected when deployed under real-time network scenarios. To overcome these issues, this te
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Patel, Jay. "Prospects of Cloud-Driven Deep Learning- Leading the Way for Safe and Secure AI." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 8, no. 3 (2020): 57–63. https://doi.org/10.55083/irjeas.2020.v08i03011.

Texto completo da fonte
Resumo:
The combination of cloud computing and deep learning models is changing the field of artificial intelligence (AI), facilitating more scalable, efficient, and adaptable systems for intricate data-driven activities. Nonetheless, as AI systems grow more powerful and widespread, guaranteeing their safety and security continues to be a significant challenge. This document investigates the future of cloud-based deep learning, specifically emphasizing innovative approaches to guarantee AI safety and security. We explore the capabilities of cloud-based systems in facilitating extensive deep learning m
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Doton, Wlson. "THE ROLE OF DATA SECURITY IN THE WORLD OF EDUCATION TO INCREASE PARENTAL TRUST." Educational Researcher Journal 1, no. 3 (2024): 41–48. https://doi.org/10.71288/educationalresearcherjournal.v1i3.19.

Texto completo da fonte
Resumo:
This study investigates the role of data security in enhancing parental trust within educational institutions. Employing a qualitative descriptive approach, data was collected through in-depth interviews with key stakeholders (principals, teachers, IT staff, and parents), direct observations of school environments, and analysis of relevant documentation. Thematic analysis revealed several key findings: Clear and comprehensive data security policies significantly contribute to parental trust. Active parental involvement in data security discussions fosters greater trust and understanding. Paren
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Udayana, IBN, Putri Dwi Cahyani, and Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)." Journal Competency of Business 2, no. 1 (2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.

Texto completo da fonte
Resumo:
The purpose of this study is to test and find out and determine the effect of perceived security and information quality on online purchase intention through trust in a reliable online store. The effect of perceived security on trust in Sorabel, the effect of information quality on trust in sorabel, the effect of perceived security on online purchase intention, the effect of information quality on online purchase intention and the influence of trust on online purchase intention. This research is quantitative. The population is Sorabel consumers in Yogyakartas. Samples were taken using a probal
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Urmetzer, Florian, and Isabelle Walinski. "User Acceptance and Mobile Payment Security." International Journal of E-Services and Mobile Applications 6, no. 2 (2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.

Texto completo da fonte
Resumo:
There have been multiple studies detailing mobile payment and its market potential. There is a gap in the literature when it comes to the study of acceptance factors focusing on security and trust. The researchers asked which qualities of security have an influence on the acceptance of a mobile payment service provider. Therefore this study will focus on distinguishing security in two dimensions: objective and subjective security. Objective security represents the user's perception of existing technical safety mechanisms. Subjective security is intangible, based on the user's feelings and perc
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Chen, Guangxuan, Liping Ding, Jin Du, et al. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud." International Journal of Digital Crime and Forensics 10, no. 1 (2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.

Texto completo da fonte
Resumo:
In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the cloud. The strategy improved the D-S evidence theory to verify the security of the peer nodes in cloud, including the calculation, combination and transfer of the direct trust and recommended trust. This solved the security problems brought on by evidence conflicts in trust combination and provides
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Leahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.

Texto completo da fonte
Resumo:
Containerisation is quickly becoming an accepted industry standard for development environments and Gartner, in a recent market forecast, estimated that by 2022 more than 75% of organisations will be using containers in production deployments. With this explosion in growth comes an added focus on security and best practices for using containers. The use of containers, in particular Docker containers, has altered some of the more traditional deployment paradigms by giving control of deployments to the development teams. This has massively benefited the DevOps release cycle, but at the expense o
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Syed, (Shawon) M. Rahman, and Lackey Robert. "E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 193–210. https://doi.org/10.5281/zenodo.4059648.

Texto completo da fonte
Resumo:
Small business e-commerce websites make an excellent target for malicious attacks. Small businesses do not have the resources needed to effectively deal with attacks. Large and some mid-size organization have teams that are dedicated to dealing with security incidents and preventing future attacks. Most small businesses do not have the capabilities of dealing with incidents the way large organizations do. Security of e-commerce websites is essential for compliance with laws and regulations as well as gaining and maintaining the trust of consumers, partners and stakeholders. Many security stand
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

D., Maheswari, and G. K. Kamalam Dr. "ART: AN ATTACK-RESISTANT TRUST MANAGEMENT SCHEME FOR MISBEHAVIOR DETECTION IN VANET." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 29–34. https://doi.org/10.5281/zenodo.345656.

Texto completo da fonte
Resumo:
Vehicular ad hoc networks (VANETs) have the potential to transform the way in which the people can travel through the creation of a safe interoperable wireless communication networks (cars, buses, traffic signals, cell phones, and other devices). In Base Line Weighted Voting (BLWV) method, it calculates only the trust value on each node by separate weight calculation of nodes. The proposed Attack-Resistant Trust Management (ART) scheme evaluates the trustworthiness of traffic data and vehicle nodes in VANETs and also easily detects the various malicious attacks. In ART scheme, Dumpster’s rule
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Ma, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu, and Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization." Future Internet 16, no. 5 (2024): 163. http://dx.doi.org/10.3390/fi16050163.

Texto completo da fonte
Resumo:
Modern supply chain systems face significant challenges, including lack of transparency, inefficient inventory management, and vulnerability to disruptions and security threats. Traditional optimization methods often struggle to adapt to the complex and dynamic nature of these systems. This paper presents a novel blockchain-based zero-trust supply chain security framework integrated with deep reinforcement learning (SAC-rainbow) to address these challenges. The SAC-rainbow framework leverages the Soft Actor–Critic (SAC) algorithm with prioritized experience replay for inventory optimization an
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Nitta, Mellania Ariya, and Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen." Journal of Management and Bussines (JOMB) 4, no. 2 (2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.

Texto completo da fonte
Resumo:
This study aims to determine the effect of trust as a mediating variable between security and perceived risk on consumer buying interest, and to determine the effect between security, perceived risk, and trust on consumer buying interest in Lazada consumers in Surabaya. This research method is quantitative. The sample in this study was 90 respondents using a non-probability sampling technique and the analytical tool used was SmartPLS 3.0. The results showed, a) that the path coefficient value of the security variable on trust was 0.512 and the p-value was 0.001, so the results of the study wer
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

S.Rajaram. "Secure Routing Path Using Trust Values for Wireless Sensor Networks." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 10. https://doi.org/10.5281/zenodo.7407765.

Texto completo da fonte
Resumo:
Traditional cryptography-based security mechanisms such as authentication and authorization are not effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node can wreak considerable damage and adversely affect the quality and reliability of data. Therefore, analyzing the trust level of a node is important. In this paper we focused about indirect trust mechani
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!