Siga este link para ver outros tipos de publicações sobre o tema: Trust by the way of security.

Artigos de revistas sobre o tema "Trust by the way of security"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Trust by the way of security".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Hungerford, Thomas. "A Better Way to Invest the Social Security Trust Fund." Challenge 49, no. 3 (2006): 90–104. http://dx.doi.org/10.2753/cha0577-5132490306.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Wang, Haoxiang. "Review on Trust Building Algorithms in IoT Security." Journal of ISMAC 3, no. 4 (2022): 326–37. http://dx.doi.org/10.36548/jismac.2021.4.004.

Texto completo da fonte
Resumo:
IoT security is a combination of physical device security and network security. The objective of the IoT security module is to hide the network from communication vulnerabilities between the transmitter module and the server. Also, the security algorithms are designed to protect the systems from software attacks and physical hardware attacks. The paper explores the ongoing advancements and research in the field of IoT security by analyzing the research limitations and issues of the existing models. The research gaps identified from the literature analysis explores the way where the research on IoT security must be narrowed. Moreover, this paper projects the evolution of security threats in the IoT network, along with the analysis of deep learning models in estimating such threats.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Bräunlich, Katharina, and Rüdiger Grimm. "Development of A Formal Security Model for Electronic Voting Systems." International Journal of Information Security and Privacy 7, no. 2 (2013): 1–28. http://dx.doi.org/10.4018/jisp.2013040101.

Texto completo da fonte
Resumo:
Trust that an electronic voting system realizes the security requirements in an adequate manner is an essential premise for electronic elections. Trust in a system can be achieved by controlling the system security. There are two ways to assure system security. One way is the evaluation and certification of the implementation’s security by neutral experts. Another way is the verification of the outcome by the users. Both approaches, verification and certification, should be combined to reasonably justify the voter’s trust in the electronic voting system. In this paper a formal security model with respect to the requirements of Fairness, Eligibility, Secrecy and Receipt-Freeness, Verifiability and Protection against Precipitation is given. This formal model helps to clarify and truly understand these requirements. Furthermore, it can be used for the evaluation and certification of online voting products according to the Common Criteria.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Ghazali, Osman, Chun Yang Leow, Shahzad Qaiser, et al. "Cloud-Based Global Online Marketplaces Review on Trust and Security." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 96. http://dx.doi.org/10.3991/ijim.v13i04.10523.

Texto completo da fonte
Resumo:
Customer disposition to data, nature of the information on site, protection<strong> </strong>concerns, trust, security concerns, and the notoriety of organization efficaciously affect the trust of Internet shoppers in the site. Two noteworthy and basic issues for e-commerce sites and consumers are trust as well as security. A belief that someone is good and honest and will not harm you, or something is safe and reliable is called trust; while security is an attempt to safeguard the data from unauthorized access. Information security is a vital management as well as technical requirement over the internet for effective and secure payment transaction activities. The safety of e-commerce resources from use, destruction, unauthorized access and alteration is known as E-commerce security so there is an urgent need to study its dimensions such as authenticity, integrity, availability, privacy, confidentiality and non-repudiation. This paper reports a review of four popular online marketplaces which are Alibaba, Amazon, eBay andTaoBao as case study on two main criteria namely building trust among users and ensuring security on the platform. Furthermore, we discuss the methods being used by each online marketplace to build trust and their unique way ofimproving the security. Finally, different ways of building trust and technique to ensure the security is presented in a tabular form for each online marketplace.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Zhakshylykova, T. A. "Psychological trust in social networks." Social'naja politika i social'noe partnerstvo (Social Policy and Social Partnership), no. 8 (August 7, 2022): 542–46. http://dx.doi.org/10.33920/pol-01-2208-04.

Texto completo da fonte
Resumo:
The article analyzes the influence of the social network on humanity. For many years, humanity has realized even in social networks the need for psychological security. Social media confrontation is psychological warfare on a virtual level. Expecting negative information on a social network, people communicate only with friends, like-minded people. Communication on the social network has intensified over the past three years, due to the pandemic in the world, minimal contact has entered the way of life of mankind. Nevertheless, any positive and negative information can affect the psychological state of a person. Therefore, security at the psychological level is necessary and requires new approaches of non-violence.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Najib, Warsun, Selo Sulistyo, and Widyawan. "QS-Trust: An IoT ecosystem security model incorporating quality of service and social factors for trust assessment." Communications in Science and Technology 9, no. 1 (2024): 153–60. http://dx.doi.org/10.21924/cst.9.1.2024.1419.

Texto completo da fonte
Resumo:
In the rapidly growing and increasingly complex Internet of Things (IoT) ecosystem, securing communication and data exchanges between devices is a major concern. To address this, we proposed QS-Trust, a trust-based security model considering both Quality of Service (QoS) and social parameters. QS-Trust uses a trust value to determine the trust level between devices and employs a QoS-aware trust-based algorithm to improve the security of data transmissions. Additionally, the model incorporates intelligence parameters such as computing power, memory capacity, device behavior and context information to enhance the accuracy of trust evaluation. Our simulation results demonstrated that QS-Trust effectively improved the security of the IoT ecosystem while maintaining the high level of QoS. The execution time of QS-Trust was in the range of 21 to 128 milliseconds, which is efficient for real-time IoT applications. QS-Trust offers a promising solution for securing the IoT ecosystem. The QS-Trust model effectively addresses the challenges of maintaining accurate and up-to-date trust levels in dynamic IoT environments through its decentralized approach, multi-factor evaluations, and adaptive algorithms. By continuously monitoring device performance and interactions and dynamically adjusting trust scores, QS-Trust ensures that the IoT network remains secure and reliable.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Kim, Sangyoung, and Taebok Lee. "Factors affecting information security compliance intention of military officer." Journal of Advances in Military Studies 5, no. 1 (2022): 5–33. http://dx.doi.org/10.37944/jams.v5i1.138.

Texto completo da fonte
Resumo:
The purpose of this study is to analyze the factors that influence the information security compliance intention of Korean military officers. For this purpose, a research model was constructed focusing on information security compliance attitude and perceived control, which are the main variables of the theory of planned behavior. In addition, security sensitivity, organization trust, information security work impediment, and sanction, were selected as independent variables. The research model was analyzed through a survey targeting Korean army officers, and the results are as follows. First, security sensitivity, organization trust, and sanctions had a significant effect on information security compliance attitude. However, the effect of information security work impediment had not been identified. Second, it was analyzed that security sensitivity and organization trust had a positive effect on perceived information security compliance control, but the effect of information security work impediment and sanction had not been verified. Third, it was confirmed that the information security compliance attitude and perceived control affect the information security compliance intention, which reconfirmed the results of previous studies. This study is meaningful in that it can improve the information security level of the military organization by suggesting a way to manage these factors.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Orkida, Ilollari, and Islami Manjola. "Auditing as a way to increase cyber security." ECONOMICUS, no. 15 (March 24, 2017): 71–89. https://doi.org/10.5281/zenodo.7584751.

Texto completo da fonte
Resumo:
Abstract Nowadays, businesses are building bottomless real-time connections with their customers, suppliers, partners, and governments, collecting and selectively sharing huge amounts of data. The value of stored and in-transit information is rising rapidly, driving new markets and generating a need for securely connecting devices and delivering trusted data. Data integrity is a vital component in economy which can pertain to individuals, companies, governments and globally. It is a measure of the validity and reliability of a data. While internal audit has taken some steps toward keeping up with the dynamic changings and complex technology, recently survey indicate that it appears still a challenge to address technology risks as cyber-attacks have become more sophisticated and more complex. Cyber threats to economic security are increasing in frequency, scale, sophistication and severity of impact. The ranges of cyber threat actors, methods of attack, targeted systems and victims are also expanding. In Ernst and Young 2016 report “Creating trust in the digital world”, the company warns that cyber security risks have been underestimated. Cyber security refers to the measures taken to protect company data in computer-based systems from loss, destruction, unauthorized access, or misuse by unintended parties. According to IIA’s 2016 Global Perspectives and Insights, Internal Audit as Trusted Cyber Adviser: “Cyber security must be considered holistically and systemically, as the effects of failure can range from an inability to conduct basic transactions, to loss of intellectual property, to potentially significant reputational damage. It is not solely a technology risk; it is a business risk and, as such, internal auditors have a critical role to play.” How can internal audit help in cyber security? Yet, most survey of board members rate technology risks, most notably cyber, as high (if not at the very top) on the list of their concerns. A growing number of wellinformed internal audit leaders are making steps toward positioning internal audit to be an organization’s trusted cyber adviser by building competencies and demonstrating proficiency in IT issues such as cyber security and big data, and providing a full range of internal audit services related to those issues. The challenge of internal audit departments is not only to understand cyber security risks but to translate that understanding into action.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Venkadesan Perumal. "Zero Trust SD-WAN: Enhancing Security and Efficiency in the Medical Industry." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1386–400. https://doi.org/10.32628/cseit25112495.

Texto completo da fonte
Resumo:
Zero Trust Software-Defined Wide Area Network (SD-WAN) technology has emerged as a critical solution for the healthcare industry undergoing digital transformation. This architecture adopts a "never trust, always verify" article that fundamentally differs from traditional perimeter-based security models, making it particularly valuable in healthcare environments where diverse stakeholders require varying access to sensitive data. The implementation of Zero Trust SD-WAN delivers multiple benefits for healthcare organizations, including enhanced security through identity verification, continuous authentication, encrypted data transmission, and comprehensive audit trails. Beyond security, it optimizes network performance through dynamic path selection, quality of service controls, and cloud connectivity optimization—essential for supporting critical applications like telemedicine and electronic health records. While implementation challenges exist, particularly regarding legacy medical device compatibility and balancing security with clinical workflows, properly executed Zero Trust frameworks significantly reduce security incidents and improve regulatory compliance. As healthcare evolves with increasing IoMT adoption, AI integration, and distributed care delivery models, Zero Trust SD-WAN will play an increasingly important role in enabling secure innovation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Surendra N Koritala. "Zero-trust security models in financial planning systems." World Journal of Advanced Research and Reviews 25, no. 3 (2025): 2161–71. https://doi.org/10.30574/wjarr.2025.25.3.0944.

Texto completo da fonte
Resumo:
The current research paper assesses the financial and operational impacts of enforcing zero-trust security models in financial planning systems. As the risk of cyberattacks intensifies and the regulations become unexpectedly complicated, these groups are in a desperate search for a comprehensive security system. As such, the zero trust security model, which focuses on real-time security monitoring, the enforcement of continuous identity validation, and the concept of least privilege, is gradually becoming considered as a relevant strategy for addressing such risks. In assessing organisational outcomes, the research uses both secondary research information and financial analysis to assess cost-savings and return on investment (ROI) across five years for the various zero-trust models. The findings show that although the initial costs of implementing zero-trust systems are high, the returns on investment are high too because of low breach costs and non-incurrence of compliance penalties. Cumulatively organizations experience positive ROI by Year 3 and have exponential financial growth by Year 5. The work also provides a comparison between the zero-trust and more conventional approaches to security as well as the benefits of adopting the new concept that helps minimize system risks and continuously meet regulatory requirements. Budgetary forecasts and graphical overlays complement the argument that zero-trust security architectures are more cost-effective and effective in the long run. In sum, this paper recommends a zero-trust security model approach as a cost-effective investment that fortifies security as well as compliance while fostering the longevity of an organization’s existence and financial profitability. With the growing threat being leveled against organisations in general, and financial institutions in particular, it is imperative that these institutions embrace the zero trust model as the best way to enhance the security and availability of their data.
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Cao, Xiao Mei, Hai Tao Zhu, He Yang Shen, and Gui Hai Chen. "Proxy-Based Security-Feedback Trust Model in MP2P Network." Applied Mechanics and Materials 462-463 (November 2013): 1144–51. http://dx.doi.org/10.4028/www.scientific.net/amm.462-463.1144.

Texto completo da fonte
Resumo:
Trust problem is a key issue for Mobile P2P (MP2P) network security. In MP2P network, terminals addressing mode, communication way and display identifier are different to traditional P2P network. Some security issues such as: malicious slander and collusion, free ride phenomenon, are even more serious compared to traditional P2P network. Aimed at these above issues, a Proxy-based Security-Feedback Trust Model (PSTM) is proposed. Different types of terminals access to different proxy servers to shield the discrepancy between different terminal equipments on MP2P equipment access network layer. Meanwhile, proxy servers can reduce the problem of single point failure with method of trust related tables backup and recovery. Certificate Feedback Raters identification and qualification through security resource-selection protocol then integrate trust information according to similarity of terminal and resource types with weight. Furthermore, set global contribution value and evaluation value in multi-granularity trust computation to motivate mobile peers honest feedbacks. Divide mobile peers direct trust value into peer-oriented and resource-oriented values to make trust feedbacks more authentic. Simulation experiments show that PSTM can reduce malicious slander and collusion effectively. It also can restrain self-ish peers free ride behaviors and increase successful cooperation rate of high-contributed nodes in MP2P network.
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Kumawat, Shyamlal, and Prof Deepak Tomar. "Trust Models in Cloud Computing - A Perspective." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 6, no. 2 (2013): 752–56. http://dx.doi.org/10.24297/ijmit.v6i2.732.

Texto completo da fonte
Resumo:
Cloud computing is a new paradigm in which dynamically scalable virtualized computing resources, services and information are provided as a service among the people and organizations across the globe over the Internet. The recent developments in cloud computing technology placed numerous challenges in the field of Cloud Computing, including data replication, consistency, reliability, availability and scalability of cloud resources, portability, trust, security, and privacy. Still most of the organizations are not adapting cloud computing due to lack of trust on service provider. This paper gives an overview of cloud computing, and discusses trust and related security challenges. The important elements of cloud environment, which shapes the users trust and provides a way of evaluating each elements importance, are emphasized. Although there are many technological approaches that can develop trust in cloud provider and improve cloud security, there are currently no one-size-fits-all solutions, and future work has to tackle challenges such as trust model for security, as well as suitable mechanisms for ensuring accountability in the cloud. As trust based schemes have been widely discussed and applied in a lot of cloud computing scenarios, becoming subject of scientific researches, this paper also presents a survey of few trust models.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Siriwardana, S. M. D. N. "Hardware Security and Trust: Trends, Challenges, and Design Tools." International Research Journal of Innovations in Engineering and Technology 08, no. 01 (2024): 119–27. http://dx.doi.org/10.47001/irjiet/2024.801016.

Texto completo da fonte
Resumo:
Hardware security in the cyber security domain had become a more of a controversial topic over the past decade due to the introduction of new design technologies in semiconductors and expansion of global supplier chains. In proportion to the technological advancement of hardware production, the success rate of the existing hardware attacks had also evolved over the time with a significantly high rate of emergence of new attacking techniques and methods. Computing hardware is becoming a more and more attractive attack surface due to several reasons. The technology of analyzing the hardware components is becoming more and more affordable and accessible to the general public than before. Also due to the influx of IoT devices in the market, trend of simplifying the design structure to decrease the power consumption and maximizing the processing speed has become the theme of modern hardware implementations rather than the security of the devices. When considering the market demand and user requirements, it is more obvious for the computer manufacturers to give priority to user requirements rather than stressing more on the security aspects of their designs and devices. But there could be some catastrophic outcomes if the security aspects of these hardware tends to fail in a critical infrastructure, because these semiconductors are used in devices ranging from simple IoT devices to more complex systems like SCADA systems. Therefore, it is always a better approach to find a balance ground between the user requirement as well as the security of the hardware, without compromising either of both in the design and development. In this article, it presents an overall insight to trends in Hardware Security domain, specifically related to modern computer hardware design and manufacturing processes, distribution, usage, their disposal and recycling. These various stages are analyzed under Three main objectives of exposing the threats to computer hardware, suggesting countermeasures to minimize or eliminate those threats and discussing about the utilization of various design tools that can assist in the way to securing these computer hardware systems in their day-to-day applications.
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Basco-Galangco, R. B., and D. L. Chinayo. "The State of Police Legitimacy Through the People's Trust and Satisfaction in the Performance of the Police of Their Duties." American Journal of Multidisciplinary Research and Innovation 1, no. 6 (2022): 47–55. https://doi.org/10.54536/ajmri.v1i6.872.

Texto completo da fonte
Resumo:
People are likely to cooperate with the police when they view their authority as legitimate. Police legitimacy is established by the people’s trust in them and the people’s satisfaction in the way they perform their duties. This study surveyed and correlated the community people’s trust and satisfaction in the police’s performance of their duties. There were 2,381 respondents from the different provinces of the Cordillera Administrative Region, Philippines, who participated in the survey. The respondents moderately trust the police and were much satisfied with the way they performed their duties. Age group makes a significant difference in the extent of trust, while gender and age group make a significant difference in the respondents’extent of satisfaction. Pearson’s r (r=.090) shows there is a weak correlation between the trust of the people to the police and their extent of satisfaction on the way the police performed their duties. It is concluded that trust and satisfaction are independent of each other insofar as police legitimacy is concerned. The police should therefore work on improving their image and demonstrating competence inperforming their duties so that the people will cooperate with them and appreciate what they are doing.
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Ragul, M., A. Aloysius, and V. Arulkumar. "Advancing IoT Security through Blockchain-Driven Dynamic Trust Evaluation." Indian Journal Of Science And Technology 18, no. 7 (2025): 526–38. https://doi.org/10.17485/ijst/v18i7.3783.

Texto completo da fonte
Resumo:
Objectives: The research presents Dynamic Trust Evaluation (DTEF) as a blockchain-powered framework for IoT security which implements real-time assessment of trust while adapting policies and detecting anomalies. The system intends to overcome scalability and privacy problems that result from operating large-scale IoT networks. Methods: Secure trust evaluations and blockchain network policy enforcement is made possible through the integration of Attribute-Based Access Control (ABAC) and Elliptic Curve Digital Signature Algorithm (ECDSA) within DTEF. Performance evaluation was conducted by testing the system through a virtual Internet of Things (IoT) network which included different devices alongside normal as well as Sybil and DoS attack profiles during its dynamic operational period. DTEF underwent evaluation through performance analysis of its detection accuracy and latency and throughput while matching results against TABI and Fabric-IoT frameworks. Findings: The detection system of DTEF reached 95.2% success in identifying harmful devices while delivering better performance than TABI (90%) and Fabric-IoT (88%). Under high transaction loads the framework delivered improved throughput performance by 15% while cutting down latency by 20%. System capabilities that update trust scores in real time coupled with adaptational access controls minimized threat response times for large IoT networks by guaranteeing high scalability and operational effectiveness. Novelty: The trust mechanism implemented in DTEF achieves better IoT security and resource optimization through its adaptive blockchain design which updates access regulations and trust ratings dynamically based on real-time device operational behavior. Keywords: Blockchain, IoT Security, Dynamic Trust Evaluation, Adaptive Policy Management, Anomaly Detection
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Revanth P S B.E. "Blockchain-Secured and VPN Integrated Power Systems Management." Dandao Xuebao/Journal of Ballistics 37, no. 1 (2025): 25–34. https://doi.org/10.52783/dxjb.v37.166.

Texto completo da fonte
Resumo:
Integration VPN and blockchain technology for power system management provides a transformative approach to the user by addressing obstacles of data security transparency and efficiency with the help of decentralized energy grids. As a modern power system, it enhances its dependency on distributed renewable energy sources and integrated smart grids which require robust protection of data and operation integrity. Blockchain provides a decentralized immutable laser for securely recording energy transaction monitoring performance and protecting from unauthorized access. This ensures transparency by promoting trust among multiple stakeholders and reducing the risk of Cybercrime. Along with blockchain VPN integration ensures encrypted communication across the power grid and ensures encrypted data transmission between nodes. It is also capable of preventing authorized access and allowing the users to remote monitor securely with the help of a dual layout framework and real-time system optimization. It supports critical applications including energy trading platform demand response programs and improves data privacy and security. Integration with VPN-encrypted connectivity and blockchain-decentralized security power systems can achieve excellent resilience against cybercrime and operational disruptions. This integrated approach created an effective way for efficient and sustainable energy management that supports innovation and trust in a rapidly transforming energy landscape. The present study is going to explore the potential of the blockchain and VPN for securing power systems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Sreevidya, B., and Dr M. Supriya. "Trust based Routing – A Novel Approach for Data Security in WSN based Data Critical Applications." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 1 (2024): 27–41. http://dx.doi.org/10.58346/jowua.2024.i1.003.

Texto completo da fonte
Resumo:
Wireless technology has changed the way entities communicate with one another. Wireless networks have created several opportunities in fields such as military, health care, and habitat monitoring, to name a few. However, only a few data-critical applications are built on wireless sensor networks, such as border reconnaissance, detecting infringement, and patient monitoring. These applications require the processing of a large amount of private data. Because most applications are data-sensitive, securing data transmission among wireless sensor networks is crucial. While incorporating data security, the most important requirement of wireless sensor nodes being energy optimized also need to be kept in consideration. There are various forms of assaults that are relevant in Wireless Sensor Networks (WSN). Attacks like Black Hole attacks, sink hole attacks, False data Injection attacks etc. are the most commonly seen attacks on WSNs. The common element in all these attacks is the concept of malicious / compromised node - a node which either drops / modifies the data content while forwarding it. Existing techniques for data security generally use cryptographic algorithms, but the use of cryptographic algorithms is in contrast with the energy optimization requirement of sensor nodes. An energy efficient data security scheme needs to be developed. The proposed system analyses several attacks and proposes a multi-layer data security approach to prevent change of data / dropping of data by the compromised nodes. The proposed system is a routing protocol referred as Trust Based Routing (TBR). A concept of trust value of a node is the core idea of TBR. Forwarding node is selected based on highest trust value and thus avoid malicious / compromised nodes from being involved in the routing process. The trust factor is calculated by considering the number of packets dropped, packets rejected, and the node's remaining energy. The idea of TBR is enhanced by incorporating the concept of past trust and trust of node towards a specific destination. This proposed scheme is referred as Extended Trust Based Routing (ETBR). This scheme is further enhanced by including Direct Trust, Indirect Trust and Energy Trust concepts. This scheme is referred as Consolidated Trust Estimation – Trust Based Routing (CTE-TBR). Network Simulator NS2 is used to simulate the proposed schemes. Various network factors are compared to classic Adhoc On-Demand Vector (AODV) and newly proposed schemes. The result indicates the effectiveness of the proposed data security scheme in terms of energy efficiency and Packet Delivery ratio (PDR).
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

El-Sayed, Hesham, Sharmi Sankar, Heng Yu, and Gokulnath Thandavarayan. "Benchmarking of Recommendation Trust Computation for Trust/Trustworthiness Estimation in HDNs." International Journal of Computers Communications & Control 12, no. 5 (2017): 612. http://dx.doi.org/10.15837/ijccc.2017.5.2895.

Texto completo da fonte
Resumo:
In the recent years, Heterogeneous Distributed Networks (HDNs) is a predominant technology implemented to enable various application in different fields like transportation, medicine, war zone, etc. Due to its arbitrary self-organizing nature and temporary topologies in the spatial-temporal region, distributed systems are vulnerable with a few security issues and demands high security countermeasures. Unlike other static networks, the unique characteristics of HDNs demands cutting edge security policies. Numerous cryptographic techniques have been proposed by different researchers to address the security issues in HDNs. These techniques utilize too many resources, resulting in higher network overheads. This being classified under light weight security scheme, the Trust Management System (TMS) tends to be one of the most promising technology, featured with more efficiency in terms of availability, scalability and simplicity. It advocates both the node level validation and data level verification enhancing trust between the attributes. Further, it thwarts a wide range of security attacks by incorporating various statistical techniques and integrated security services. In this paper, we present a literature survey on different TMS that highlights reliable techniques adapted across the entire HDNs. We then comprehensively study the existing distributed trust computations and benchmark them in accordance to their effectiveness. Further, performance analysis is applied on the existing computation techniques and the benchmarked outcome delivered by Recommendation Trust Computations (RTC) is discussed. A Receiver Operating Characteristics (ROC) curve illustrates better accuracy for Recommendation Trust Computations (RTC), in comparison with Direct Trust Computations (DTC) and Hybrid Trust Computations (HTC). Finally, we propose the future directions for research and highlight reliable techniques to build an efficient TMS in HDNs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Pavlidis, Michalis, Haralambos Mouratidis, and Shareeful Islam. "Modelling Security Using Trust Based Concepts." International Journal of Secure Software Engineering 3, no. 2 (2012): 36–53. http://dx.doi.org/10.4018/jsse.2012040102.

Texto completo da fonte
Resumo:
Security modelling and analysing not only require solving technical problems but also reasoning on the organization as a whole for the development of a secure system. Assumptions exist about trust relationships among actors within the system environment, which play an important role in modelling and analysing security. Such assumptions are critical and must be analysed systematically for ensuring the overall system security. In this paper, the authors introduce trust-based concepts to identify these trust assumptions, and integrate the trust concepts with security concepts for the development of secure software systems. For this purpose, Secure Tropos’ security modelling activities are extended with trust modelling activities based on the trust-based concepts. The CASE tool SecTro was extended to include the notation of the trust-based concepts to support the methodology. Finally, a running example from the UK National Health Service (NHS) domain is used to demonstrate how trust can be used for security modelling.
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Xu, Mingyang, Junli Guo, Haoyu Yuan, and Xinyu Yang. "Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture." Electronics 12, no. 4 (2023): 782. http://dx.doi.org/10.3390/electronics12040782.

Texto completo da fonte
Resumo:
Zero-trust security architecture reconstructs the trust foundation of access control based on authentication and authorization by continuously authenticating the terminal during the authentication process and not relying solely on geographic location/user attributes as the sole basis for the trust assessment. However, due to the fine-grained verification of identity under the zero-trust security architecture, there is a need for multiple authentication and authorization processes. If a single policy engine has unknown vulnerabilities and unknown backdoors to be maliciously attacked, or DDOS attacks initiated by known vulnerabilities cannot be prevented, the policy engine based on this control center architecture cannot meet the requirements of system security and reliability. Therefore, it is proposed to apply the SPA single-package authorization and endogenous security architecture to the zero-trust authentication system, which can realize the reliability, dynamism and diversity of system defense. Through the experimental antiattack analysis and antiattack test, the test from the proposed scheme found that when the system introduces the endogenous security architecture, the security of the system can be improved due to the complexity of the attack process and the increase in the cost of the attack. The test through both the security and system overhead found that the scheme can effectively improve the security of the system while ensuring the quality of network services, compared to the traditional scheme. It was found that the scheme can effectively improve the security of the system while ensuring the quality of network services and has better adaptability than the traditional zero-trust authentication scheme.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Yan, Ye, and Fanghua Lu. "A Survey and Analysis on the Sense of Nuclear Safety & Security for the Public: A Chinese Perspective." Sustainability 10, no. 7 (2018): 2495. http://dx.doi.org/10.3390/su10072495.

Texto completo da fonte
Resumo:
With the new round of global nuclear issues, the populace’s emotion has been tensed and discomposure has been trigged off. To accurately understand the sense of nuclear safety & security for the Chinese public and ensure that the government makes reasonable decisions regarding nuclear issues, a special questionnaire and evaluation has been carried out. With the use of the principles for sociology of security, the methods of questionnaires and SPSS, a three-dimension assessment system, which consists of knowledge and experience, internal, and external trust, and the way of perception, was constructed. This research shows that the state of Chinese populace’s sense of nuclear safety & security is generally as follows: their knowledge of nuclear safety & security and personal experience are still on a low to intermediate level; In terms of trust, it shows that the populace has lack of adequate trust in nuclear safety & security of neighboring countries or regions, as well as Chinese government’s countermeasures; in the way of perception of nuclear safety & security, the populace has few options of related information sources and though the sources are less reliable. Also, the size of the audience of nuclear safety & security is far short of what is desired. Finally, the comprehensive assessment holds that the current overall sense of security for the Chinese populace is on a low to intermediate level (40.71%). This paper points out that China should strengthen the popularization of the security of nuclear science to enhance public security confidence, also, further, more detailed and specific safeguarding measures regarding nuclear safety & security should be made to promote the development of nuclear safety & security affairs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Zhi, Kuiyun, Qiurong Tan, Si Chen, et al. "How Does Social Security Fairness Predict Trust in Government? The Serial Mediation Effects of Social Security Satisfaction and Life Satisfaction." International Journal of Environmental Research and Public Health 19, no. 11 (2022): 6867. http://dx.doi.org/10.3390/ijerph19116867.

Texto completo da fonte
Resumo:
Several studies have found that trust in government is associated with social fairness, citizens’ satisfaction with public service, and life satisfaction. This study aimed to investigate the serial mediation effects of social security satisfaction and life satisfaction on the association between social security fairness and trust in government. We analyzed the data from the Chinese Social Survey in 2019 (n = 7403) to examine the serial mediation effects. The findings showed that the higher the level of government, the greater the trust it enjoyed from its citizens. The direct prediction of trust by social security fairness was stronger at the county and township levels than at the central government level. Both social security satisfaction and life satisfaction partially mediated the relationship between social security fairness and overall trust in government. Social security fairness indirectly positively predicted trust in local government at the county and township levels through social security satisfaction, life satisfaction, and their serial mediation. While social security fairness could only indirectly predict trust in central government through social security satisfaction, the prediction of trust in central government via life satisfaction (mediator) was not significant. We observed a serial mediation model in which social security fairness positively predicted trust in government directly and indirectly through social security satisfaction and life satisfaction. The finding that social security satisfaction partially mediates the relationship between perceptions of fairness in the social security system and trust in government has implications for improving policies and the functioning of the system at all levels of the government.
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Dr., Namita Mittal. "User Perceptions of Privacy and Security in Online Social Networks." International Journal of Innovative Science and Research Technology 8, no. 1 (2023): 91–94. https://doi.org/10.5281/zenodo.7547576.

Texto completo da fonte
Resumo:
User perceptions of privacy and security on online social networks is a complex issue that encompasses various factors such as awareness of privacy settings, trust in the platform, use of third-party apps and services, attitudes towards data collection and usage, response to privacy breaches, perception of misinformation, and usage of privacy-enhancing tools. This can greatly influence the way they interact with the platform. Users' reaction to privacy breaches, perception of misinformation, and usage of privacy-enhancing tools can also greatly impact their trust and behavior on the platform. Platforms that provide transparent policies, robust security measures, easy-to-use interfaces, and a responsive approach to user concerns can help to build trust and engage users
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Joshi, Prince, Vishal Dhangar, Manish Muchhala, and Surajbhan Singh Mandloi. "Cloud Computing Security." International Journal for Research in Applied Science and Engineering Technology 11, no. 1 (2023): 1630–37. http://dx.doi.org/10.22214/ijraset.2023.48889.

Texto completo da fonte
Resumo:
bstract: Cloud computing environment is a new way in which web base enable applications provide as a service for the users with low computational cost through internet. As we store data and it also provide services in distributed environment. Cloud ease its users byproviding virtualization technology of resources through internet. Cloud computing is the emerging field, due to this reason the various new techniques are still developing. At current scenario new security challenges were increases for cloud professionals. Due to lack of security in cloud computing environment user of cloud lost it trust in cloud. Multi-tenancy, elasticity, Security Performance and Optimization, etc. are various security issues in cloud computing. In this paper we will discuss some of the issue incloud. This paper also discusses some of the existing security technique for securing a cloud and help researchers and professionals to know about various security threats
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Sun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.

Texto completo da fonte
Resumo:
Purpose – As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security threats carefully and expect that the results serve as a reference guide for designing the robust trust and reputation management mechanisms. Design/methodology/approach – Based on the published literature, the paper reviews and categorizes the most critical and important security threats that apply to trust and reputation models. Findings – A detailed review and a dedicated taxonomy table are derived. As emphasized earlier, they could serve as the most important guideline for design of trust and reputation mechanisms. Originality/value – The papers work contributes to: first, understand in details what kind of security threats may cause damage to trust and reputation management mechanisms for web services selection; and second, categorize these complex security threats and then assist in planning the defense mechanisms.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Almarri, Seetah, and Ahmed Aljughaiman. "Blockchain Technology for IoT Security and Trust: A Comprehensive SLR." Sustainability 16, no. 23 (2024): 10177. http://dx.doi.org/10.3390/su162310177.

Texto completo da fonte
Resumo:
After the emergence of the Internet of Things (IoT), the way devices interact with each other changed, as it allowed automation and seamless communication in various fields. However, various challenges related to security and trust have emerged, hindering the widespread adoption of the IoT. Blockchain technology is considered the ideal solution to face these challenges because of its immutable and decentralized nature. This paper explores the potential of blockchain technology to address critical security and trust challenges within the rapidly growing IoT ecosystem. Through a systematic literature review, this study examines how blockchain’s decentralized, immutable, and transparent features contribute to enhancing security and trust in IoT networks. Key findings indicate that blockchain integration can prevent data manipulation, ensure robust identity management, and facilitate transparent, verifiable transactions, supporting both security and trust in IoT systems. These attributes not only improve IoT security but also promote sustainable practices by optimizing resource efficiency, reducing environmental impact, and enhancing resilience in systems like supply chain management and smart grids. Additionally, this study identifies open research challenges and suggests future directions for optimizing blockchain in IoT environments, focusing on scalability, energy-efficient consensus mechanisms, and efficient data processing.
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Manalu, Ignasius Falentino, Basrah Saidani, and Shandy Aditya. "Pengaruh Perceived Security dan Perceived Ease of Use terhadap Intention to Use Dengan Trust sebagai Intervening pada Penggunaan Aplikasi Pembayaran Digital di Jakarta." Jurnal Bisnis, Manajemen, dan Keuangan 3, no. 1 (2022): 186–97. http://dx.doi.org/10.21009/jbmk.0301.14.

Texto completo da fonte
Resumo:
This study aims to explain a comprehensive model that explains the impact of perceived security and perceived ease of use in influencing intention to use and how they contribute through trust in the context of using digital payment applications in Jakarta. The purpose of this study is to analyze the effect of perceived security on trust, the effect of perceived ease of use on trust, the effect of perceived security on intention to use, the effect of perceived ease of use on intention to use, the effect of trust on intention to use, the effect of perceived security on intention to use through trust, the effect of perceived ease of use on intention to use through trust, as well as the influence of perceived security on intention to use indirect effect through trust and the influence of perceived ease of use on intention to use indirect effect through trust in the use of digital payment applications. Data was collected by using questionnaires online methods to reduce the impact of the covid 19 virus during a pandemic. The object of this research is 150 respondents who are users of digital payment applications. Data analysis to test the validity and reliability using SPSS version 24 and using the Structural Equation Model (SEM) research method with AMOS version 24 to process research data. The results of hypothesis testing show: that perceived security has a significant effect on trust, perceived easeof use has a significant effect on trust, perceived security has a significant effect on the intention to use e payment, perceived ease of use has a significant effect on the intention to use e[1]payment. Trust has a significant effect on the intention to use e payment. Perceived security has a direct significant effect on the intention to use through trust, perceived ease of use does not have a direct significant effect on the intention to use through trust. Perceived security has a significant indirect effect on the intention to use through trust, and perceived ease of use has a significant indirect effect on the intention to use through trust.
 
 Penelitian ini bertujuan untuk menjelaskan model komprehensif yang menjelaskan pengaruh dampak perceived security dan perceived ease of use dalam mempengaruhi intention to usedan bagaimana kontribusinya melalui trust dalam konteks penggunaan aplikasi pembayaran digital di Jakarta. Tujuan dari penelitian ini dimaksudkan untuk menganalisis pengaruh perceived security terhadap trust, pengaruh perceived ease of use terhadap trust, pengaruh perceived security terhadap intention to use, pengaruh perceived ease of use terhadap intention to use, pengaruh trust terhadap intention to use, pengaruh perceived security terhadap intention to use melalui trust pengaruh perceived ease of use terhadap intention to use melalui trust, serta pengaruh perceived security terhadap intention to use secara tidak langsung melalui trust dan pengaruh perceived ease of use terhadap intention to use secara tidak langsung melalui trustpada penggunaan aplikasi pembayaran digital. Pengumpulan data dilakukan dengan menggunakan metode penyebaran kuesioner secara online untuk mengurangi dampak penyebaran virus covid 19 selama pandemi. Objek penelitian ini berjumlah 150 responden yang merupakan pengguna aplikasi pembayaran digital. Analisis data untuk uji validitas dan reliabilitas menggunakan SPSS versi 24 dan menggunakan metode penelitian Structural Equation Model (SEM) dengan AMOS versi 24 untuk mengolah data penelitian. Hasil pengujian hipotesis menunjukkan: perceived security berpengaruh signifikan terhadap trust, perceived ease of use berpengaruh signifikan terhadap trust, perceived security berpengaruh signifikan terhadap intention to use e payment, perceived ease of use berpengaruh signifikan terhadap intention to use e payment. Trust berpengaruh signifikan terhadap intention to use e[1]payment. Perceived security berpengaruh signifikan secara langsung terhadap intention to usemelalui trust, perceived ease of use tidak berpengaruh signifikan secara langsung terhadap intention to use melalui trust. Perceived security berpengaruh signifikan secara tidak langsungterhadap intention to use melalui trust, perceived ease of use berpengaruh signifikan secara tidak langsung terhadap intention to use melalui trust.
 This study aims to explain a comprehensive model that explains the impact of perceived security and perceived ease of use in influencing intention to use and how they contribute through trust in the context of using digital payment applications in Jakarta. The purpose of this study is to analyze the effect of perceived security on trust, the effect of perceived ease of use on trust, the effect of perceived security on intention to use, the effect of perceived ease of use on intention to use, the effect of trust on intention to use, the effect of perceived security on intention to use through trust, the effect of perceived ease of use on intention to use through trust, as well as the influence of perceived security on intention to use indirect effect through trust and the influence of perceived ease of use on intention to use indirect effect through trust in the use of digital payment applications. Data was collected by using questionnaires online methods to reduce the impact of the covid 19 virus during a pandemic. The object of this research is 150 respondents who are users of digital payment applications. Data analysis to test the validity and reliability using SPSS version 24 and using the Structural Equation Model (SEM) research method with AMOS version 24 to process research data. The results of hypothesis testing show: that perceived security has a significant effect on trust, perceived easeof use has a significant effect on trust, perceived security has a significant effect on the intention to use e payment, perceived ease of use has a significant effect on the intention to use e[1]payment. Trust has a significant effect on the intention to use e payment. Perceived security has a direct significant effect on the intention to use through trust, perceived ease of use does not have a direct significant effect on the intention to use through trust. Perceived security has a significant indirect effect on the intention to use through trust, and perceived ease of use has a significant indirect effect on the intention to use through trust.
 Abstrak
 Penelitian ini bertujuan untuk menjelaskan model komprehensif yang menjelaskan pengaruh dampak perceived security dan perceived ease of use dalam mempengaruhi intention to usedan bagaimana kontribusinya melalui trust dalam konteks penggunaan aplikasi pembayaran digital di Jakarta. Tujuan dari penelitian ini dimaksudkan untuk menganalisis pengaruh perceived security terhadap trust, pengaruh perceived ease of use terhadap trust, pengaruh perceived security terhadap intention to use, pengaruh perceived ease of use terhadap intention to use, pengaruh trust terhadap intention to use, pengaruh perceived security terhadap intention to use melalui trust pengaruh perceived ease of use terhadap intention to use melalui trust, serta pengaruh perceived security terhadap intention to use secara tidak langsung melalui trust dan pengaruh perceived ease of use terhadap intention to use secara tidak langsung melalui trustpada penggunaan aplikasi pembayaran digital. Pengumpulan data dilakukan dengan menggunakan metode penyebaran kuesioner secara online untuk mengurangi dampak penyebaran virus covid 19 selama pandemi. Objek penelitian ini berjumlah 150 responden yang merupakan pengguna aplikasi pembayaran digital. Analisis data untuk uji validitas dan reliabilitas menggunakan SPSS versi 24 dan menggunakan metode penelitian Structural Equation Model (SEM) dengan AMOS versi 24 untuk mengolah data penelitian. Hasil pengujian hipotesis menunjukkan: perceived security berpengaruh signifikan terhadap trust, perceived ease of use berpengaruh signifikan terhadap trust, perceived security berpengaruh signifikan terhadap intention to use e payment, perceived ease of use berpengaruh signifikan terhadap intention to use e payment. Trust berpengaruh signifikan terhadap intention to use e[1]payment. Perceived security berpengaruh signifikan secara langsung terhadap intention to usemelalui trust, perceived ease of use tidak berpengaruh signifikan secara langsung terhadap intention to use melalui trust. Perceived security berpengaruh signifikan secara tidak langsungterhadap intention to use melalui trust, perceived ease of use berpengaruh signifikan secara tidak langsung terhadap intention to use melalui trust.
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Singh, Supriya. "The Social Dimensions of the Security of Internet Banking." Journal of Theoretical and Applied Electronic Commerce Research 1, no. 2 (2006): 72–78. http://dx.doi.org/10.3390/jtaer1020014.

Texto completo da fonte
Resumo:
This paper examines the users’ perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the technological and industrial approaches to security. The user-centered research on banking was conducted at the Royal Melbourne University of Technology University and Griffith University, both of which are part of the Smart Internet Technology Cooperative Research Centre. We conclude that the most effective way to increase the perception of Internet banking security is to increase ease of use, convenience, personalisation and trust. Without the perception of security, there will be little trust in banking and transactions on the Internet. This will impede the use of Internet banking and e-commerce which are increasingly important aspects of the nation’s critical infrastructure.
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Curtis, Shelby R., Jessica Rose Carre, and Daniel Nelson Jones. "Consumer security behaviors and trust following a data breach." Managerial Auditing Journal 33, no. 4 (2018): 425–35. http://dx.doi.org/10.1108/maj-11-2017-1692.

Texto completo da fonte
Resumo:
Purpose The purpose of this study was to determine how security statement certainty (overconfident, underconfident and realistic) and behavioral intentions of potential consumers impact the perceptions of companies in the presence or absence of a past security breach. Design/methodology/approach The study exposed participants to three types of security statements and randomly assigned them to the presence or absence of a previous breach. Participants then evaluated the company and generated a hypothetical password for that company. Findings This study found that the presence or absence of a previous breach had a large impact on company perceptions, but a minimal impact on behavioral intentions to be personally more secure. Research limitations/implications The authors found that the presence or absence of a previous breach had a large impact on company perceptions, but minimal impact on behavioral intentions to be personally more secure. Practical implications Companies need to be cautious about how much confidence they convey to consumers. Companies should not rely on consumers engaging in secure online practices, even following a breach. Social implications Companies need to communicate personal security behaviors to consumers in a way that still instills confidence in the company but encourages personal responsibility. Originality/value The confidence of company security statements and presence of a previous breach were examined for their impact on company perception and a novel dependent variable of password complexity.
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Usman, Aminu Bello, William Liu, Quan Bai, and Ajit Narayanan. "Trust of the Same." International Journal of Information Security and Privacy 9, no. 2 (2015): 13–30. http://dx.doi.org/10.4018/ijisp.2015040102.

Texto completo da fonte
Resumo:
Trust and reputation management represents a significant trend in tackling the emerging security problems in computer networks. The basic idea is to let machines rate each other and then use the aggregated ratings to derive trust scores. Homophily i.e., love of the same, is the tendency of individuals to associate and bond with similar others mentioned in the social network, and the authors have discovered its presence, in term of nodes' attributes, in studying trust and reputation behaviors for the P2P oriented next generation of WSN. The simulation studies have confirmed the structural homophily, i.e., the similar way of connecting other nodes, is fostering trust characteristics and connections among peers.
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Negi, Shalabh, and Jayanthi R. "SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 481. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20525.

Texto completo da fonte
Resumo:
Management of trust is one of the most challenging parts in cloud computing. Cloud service’s features such as distributed, dynamic and nontransparentintroduces several challenges for availability, privacy, and security. A method is proposed to have trust as a service between cloud serviceprovider and customer by creating a cloud armor. This proposed methodology is used to make cloud server end and customer end system secure ofany intrusion to their privacy. In this methodology, we will have a user usage pattern log as ever user has its own unique way of using his/her system;hence, in case if any odd user pattern is being encountered it will automatically block the system and simultaneously shoots a message as well as a callto the user notifying him/her about this unauthorized access. This log is set a various small pattern log, for example, keylog, preferable website visited,and time of accessing the system. Further, we have secured these logs using Rivest-Shamir-Adleman algorithm with very large key size.
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Lalli, M., and J. Lawanya. "Ensuring the Security by Using Fuzzy Based Trust Routing Scheme in MANET." Asian Journal of Engineering and Applied Technology 7, no. 2 (2018): 74–79. http://dx.doi.org/10.51983/ajeat-2018.7.2.1002.

Texto completo da fonte
Resumo:
MANETs are substantially more defenseless to different attacks due to receptiveness in network topology and being endless of a preferred performance in the network. As a result of that, more malicious nodes are regularly intruding without being recognized from the network topology. MANET needs exceptionally particular security techniques to detach the false passage. Also, no single solution is fit into various sorts of the network. The networks perform admirably if the nodes are trusty and act appropriately helpfully. The goal is to enhance the security of the network. This paper begins the new intriguing way to deal with assessing the trustworthiness of the nodes. Fuzzy Trust-based Secured Routing (FTSR) approach presented to deal with a select the trusted route to meet the necessity of the security of the information transmission. In this, the fuzzy logic rule prediction component is adapted to see the future conduct of the node by refreshing the node’s trust. We have additionally broken down the execution measurements, for example, the packet transmission rate, end-to-end delay and average throughput which can likewise increment in most up to date approach.
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Ola, Adegboyega Adedolapo. "Electoral Violence and Arms Proliferation in Nigeria: Causes, Consequences and Way Forward." African Journal of Stability and Development (AJSD) 11, no. 2 (2018): 446–59. http://dx.doi.org/10.53982/ajsd.2018.1102.13-j.

Texto completo da fonte
Resumo:
One of the greatest challenges facing governance and political systems in Africa is the violence that ensues whenever elections are conducted. The main objective of the study was to examine the relationship between electoral violence and arms proliferation in Nigeria. It also examines the causes and implications of electoral violence on the electorate, entire community and Nigeria’s political system. The adopted research methodology is desktop research, where information was obtained from journals, textbooks, conference papers and others. The findings of the study revealed a link between small arms and electoral violence, and it was discovered that illicit proliferation of small arms is a major cause of electoral violence in Nigeria. The study established the lack of trust of the politicians on the electoral process which is a challenge to the nation’s nascent democracy and sustainability of peace and security. The study therefore, recommended that security agencies that are involved in the electoral system should be trained on electoral security system, in order to improve the level of security in the country. The study also posits that the control of small arms is very essential in curtailing the high level of illicit flow of arms in the country before and during elections.
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Cvetković, Vladimir M., Milan Lipovac, Renate Renner, Svetlana Stanarević, and Zlatko Raonić. "A Predictive Framework for Understanding Multidimensional Security Perceptions Among Students in Serbia: The Role of Institutional, Socio-Economic, and Demographic Determinants of Sustainability." Sustainability 17, no. 11 (2025): 5030. https://doi.org/10.3390/su17115030.

Texto completo da fonte
Resumo:
This study investigates and forecasts multidimensional security perceptions among Serbian university students, who are a particularly engaged and vulnerable demographic in transitional societies. It examines how demographic traits, socio-economic status, and levels of institutional trust and engagement shape students’ evaluations of security in everyday life. The study examines six primary dimensions of security perception: personal safety, safety at public events and demonstrations, perceived national threats, digital security and privacy, perception of emergencies and crises, and trust in institutions and security policies. A structured online survey was administered to a sample of 406 university students selected through non-probability purposive sampling from major academic centres in Serbia, including Belgrade, Niš, Novi Sad, and Kragujevac. The questionnaire, based on a five-point Likert scale, was designed to measure levels of agreement across the six dimensions. Data were analysed using multiple regression, one-way ANOVA, Pearson’s correlation, and independent samples t-tests. All necessary statistical assumptions were met, ensuring the reliability and validity of the results. Descriptive statistics indicated moderate to moderately high overall perceived safety, with personal safety scoring the highest, followed by digital security and disaster preparedness. Lower scores were recorded for public event safety, perceived national threats, and, in particular, trust in institutional security policies. Regression analysis revealed that key predictors of perceived safety varied across dimensions: gender was a significant predictor of personal safety. At the same time, family financial status had a strong influence on perceptions of safety at public events. These findings offer valuable insights for designing targeted risk communication, inclusive policy initiatives, and institutional reforms that aim to enhance youth resilience, civic trust, and participatory security governance, ultimately contributing to long-term social sustainability.
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Nurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.

Texto completo da fonte
Resumo:
This research aims to understand the Influence of security, privacy, and reputation toward trust in online shopping consumer. The purpose of this research are: (1) the effect of security toward trust in online shopping consumer, (2) The effect of privacy toward trust in online shopping consumer, (3) The effect of reputation toward trust in online shopping consumer, (4) The effect of security, privacy, and reputation toward trust in online shopping consumer. The type of research used in this study was a causal quantitative research. The population in this study was citizens of Padang city, that has been to online shopping. The sampling technique employed in this study was purposive sampling method with the total samples of 100 people. The data collection technique used in this study was questionnaire that has been tested for validly and reliability. The data analysis technique employed in this study to answer the hypothesis was multiple regressions. The result of this study shows that partially independent variable security (X1) significantly influenced the trust in online shopping consumer, privacy variable (X2) significantly influenced the trust in online shopping consumer, and reputation variable (X3) significantly influenced the trust in online shopping consumer. Simultaneously, variables security, privacy, and reputation significantly influenced trust in online shopping consumer.Keyword: Trust In Online Shopping Consumer, Security, Privacy, and Reputation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Jagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.

Texto completo da fonte
Resumo:
The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can be made use to secure application built on the Ubiquitous Computing Environment (UCE) such as health care, smart office, smart ubiquitous home, etc.
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Wenander, Henrik. "Sincere Cooperation, Mutual Trust, and Mutual Recognition in Social Security Coordination." Review of European Administrative Law 13, no. 3 (2020): 89–108. http://dx.doi.org/10.7590/187479820x16007576818834.

Texto completo da fonte
Resumo:
This article looks into the meaning of the concepts of sincere cooperation, mutual trust, and mutual recognition in EU social security coordination. It analyses the legislative choice of coordination as the main regulatory mechanism in the field, and examines the role of administrative cooperation. Furthermore, the article highlights the challenges that arise in situations where mutual recognition is required under the Regulations, as in connection with portable documents relating to the posting of workers. It also considers the limits to mutual trust via the principle of prohibition of fraud and abuse of rights established in the case law of the CJEU on free movement. In the last few years, this principle has been extended into the field of social security law, notably in Altun. In this way, the coordination regime does not require totally blind trust: rather, it balances the Member States' interests of maintaining the integrity of their social security systems with the Union interest of simplifying free movement. As in other fields of EU law relating to free movement, the mutual trust between the Member States in social security coordination may therefore be set aside in extraordinary cases.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Khuspe, Snehal Tukaram. "A Study on the Impact of Cybersecurity Threats on Consumer Trust in E-Commerce: A Case of Navi Mumbai." International Journal of Economics, Business, Accounting, Agriculture and Management towards Paradigm Shift in Research (IJEBAMPSR) 2, no. 1 (2025): 172–76. https://doi.org/10.5281/zenodo.15294244.

Texto completo da fonte
Resumo:
<em>Abstract</em> <em>The rapid expansion of e-commerce has revolutionized the way consumers engage in online transactions. However, cybersecurity threats such as data breaches, phishing attacks, identity theft, and online fraud have significantly impacted consumer trust. This study investigates the relationship between cybersecurity threats and consumer trust in e-commerce within Navi Mumbai. The research aims to analyze consumer awareness, the impact of security breaches on purchasing decisions, and the effectiveness of security measures adopted by e-commerce platforms. The findings suggest that consumers in Navi Mumbai exhibit high concerns regarding cybersecurity threats, influencing their trust levels in online platforms. Recommendations are provided for enhancing security frameworks to improve consumer confidence in e-commerce transactions.</em> <em>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The study also highlights that consumer in Navi Mumbai are increasingly aware of cybersecurity threats, privacy, with many actively seeking secure payment options and looking for trust signals like SSL certificates and secure payment gateways before making online purchases. While e-commerce platforms have implemented various security measures, such as multi-factor authentication and encryption, these efforts are often perceived as insufficient by some consumers. Moreover, the research identifies a direct correlation between the frequency of security breaches and a decline in consumer trust, which in turn affects sales and customer loyalty. It is recommended that e-commerce platforms invest in different advanced security technologies, provide transparent communication regarding their security protocols, and educate consumers about best practices for safe online shopping. Strengthening these areas could significantly boost consumer confidence and contribute to the long-term success of e-commerce businesses in Navi Mumbai.</em>
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Kapse, Smita, Latesh Malik, and Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS." ASEAN Engineering Journal 14, no. 2 (2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.

Texto completo da fonte
Resumo:
Blockchain deployments require efficient consensus models in order to be scaled for larger networks. Existing consensus models either use stake-levels, trust-levels, authority-levels, etc. or their combinations in order to reduce mining delay while maintaining higher security levels. But these models either have higher energy requirements, lower security, or have linear/exponential relationship between mining delay and length of the chains. Due to these restrictions, the applicability of these models is affected when deployed under real-time network scenarios. To overcome these issues, this text proposes design of an efficient novel trust-based hybrid consensus model for securing blockchain deployments. The proposed model initially uses a hybrid consensus model that fuses Proof-of-Work (PoW), Proof-of-Stake (PoS) with Proof-of-Temporal-Trust (PoTT) for improving security while maintaining higher Quality of Service (QoS) levels. The PoTT Model fuses together temporal mining delay, temporal mining energy, throughput and block mining efficiency in order to generate miner-level trusts. These trust values are fused with Work efficiency and Stake levels and used for selection of miners. The selected miners are used for serving block addition requests, which assists in improving mining speed by 3.2%, reducing energy consumption 4.5%, and improving throughput by 8.5%, while improving block mining efficiency by 2.9% when compared with existing mining optimization models. This performance was validated under Sybil, Finney, Man-in-the-Middle, and Spoofing attacks. Performance of the model was observed to be consistent even under attacks, thereby making it useful for real-time network scenarios.
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Doton, Wlson. "THE ROLE OF DATA SECURITY IN THE WORLD OF EDUCATION TO INCREASE PARENTAL TRUST." Educational Researcher Journal 1, no. 3 (2024): 41–48. https://doi.org/10.71288/educationalresearcherjournal.v1i3.19.

Texto completo da fonte
Resumo:
This study investigates the role of data security in enhancing parental trust within educational institutions. Employing a qualitative descriptive approach, data was collected through in-depth interviews with key stakeholders (principals, teachers, IT staff, and parents), direct observations of school environments, and analysis of relevant documentation. Thematic analysis revealed several key findings: Clear and comprehensive data security policies significantly contribute to parental trust. Active parental involvement in data security discussions fosters greater trust and understanding. Parental perceptions of data security directly influence their overall trust in the school. Challenges in implementing data security, such as budget constraints and staff training, require innovative solutions. The study emphasizes the need for a holistic approach to data security in education. By prioritizing data security, fostering open communication with parents, and addressing implementation challenges, schools can cultivate stronger trust, enhance student learning outcomes, and build a positive reputation within the community.
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Udayana, IBN, Putri Dwi Cahyani, and Desti Nur Chotimah. "PENGARUH PERCEIVED SECURITY DAN INFORMATION QUALITY TERHADAP ONLINE PURCHASE INTENTION MELALUI TRUST (Study Kasus Pada Konsumen Sorabel di Yogyakarta)." Journal Competency of Business 2, no. 1 (2018): 53–68. http://dx.doi.org/10.47200/jcob.v2i1.659.

Texto completo da fonte
Resumo:
The purpose of this study is to test and find out and determine the effect of perceived security and information quality on online purchase intention through trust in a reliable online store. The effect of perceived security on trust in Sorabel, the effect of information quality on trust in sorabel, the effect of perceived security on online purchase intention, the effect of information quality on online purchase intention and the influence of trust on online purchase intention. This research is quantitative. The population is Sorabel consumers in Yogyakartas. Samples were taken using a probality sampling technique with a total questionnaire of 100 respondents. Primary data collection techniques using questionnaires. The method of data analysis using multiple linear regression previously conducted a classic assumption test consisting of normality test, heteroxidation test and multicolonierity test. The results showed that there was a positive effect on perceived security, a positive influence on information quality, a positive influence on trust and online purchase intention. Significant positive effect of perceived security on trust; significant positive effect of information quality on trust; significant positive effect of perceived security on online purchase intention; significant positive effect of trust on online purchase intention.
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Patel, Jay. "Prospects of Cloud-Driven Deep Learning- Leading the Way for Safe and Secure AI." INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING & APPLIED SCIENCES 8, no. 3 (2020): 57–63. https://doi.org/10.55083/irjeas.2020.v08i03011.

Texto completo da fonte
Resumo:
The combination of cloud computing and deep learning models is changing the field of artificial intelligence (AI), facilitating more scalable, efficient, and adaptable systems for intricate data-driven activities. Nonetheless, as AI systems grow more powerful and widespread, guaranteeing their safety and security continues to be a significant challenge. This document investigates the future of cloud-based deep learning, specifically emphasizing innovative approaches to guarantee AI safety and security. We explore the capabilities of cloud-based systems in facilitating extensive deep learning models, highlighting their benefits in resource management, model training, and instantaneous inference. The article further explores the new risks linked to cloud-based AI, including adversarial threats, data privacy issues, and challenges with model robustness. To tackle these challenges, we suggest a framework that incorporates security measures such as secure multi-party computation, federated learning, and differential privacy into cloud-based deep learning workflows. Additionally, we examine the function of explainable AI (XAI) in improving trust and responsibility within cloud-based AI systems. By conducting an extensive analysis of recent progress, this paper offers perspectives on the future trajectory of safe and secure AI in the cloud, highlighting the significance of strong security frameworks, transparency, and ethical factors in AI implementation. As cloud infrastructures advance, the incorporation of sophisticated security functionalities will be crucial for the ethical development and implementation of deep learning technologies.
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Urmetzer, Florian, and Isabelle Walinski. "User Acceptance and Mobile Payment Security." International Journal of E-Services and Mobile Applications 6, no. 2 (2014): 37–66. http://dx.doi.org/10.4018/ijesma.2014040104.

Texto completo da fonte
Resumo:
There have been multiple studies detailing mobile payment and its market potential. There is a gap in the literature when it comes to the study of acceptance factors focusing on security and trust. The researchers asked which qualities of security have an influence on the acceptance of a mobile payment service provider. Therefore this study will focus on distinguishing security in two dimensions: objective and subjective security. Objective security represents the user's perception of existing technical safety mechanisms. Subjective security is intangible, based on the user's feelings and perception towards security (trust). The Technology Acceptance Model (TAM) was the theoretical model used in the study. About three hundred responses were collected using an online questionnaire. The study showed that despite the financial crisis banks are still the preferred providers for mobile payment services, where over 80% of the respondents would like to receive the service from a bank. In contrast, only 20% would like to receive such a service from a mobile phone producer. Additionally objective security does not substantially increase subjective security; hence the user trusts the provider rather than the technology itself.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Chen, Guangxuan, Liping Ding, Jin Du, et al. "Trust Evaluation Strategy for Single Sign-on Solution in Cloud." International Journal of Digital Crime and Forensics 10, no. 1 (2018): 1–11. http://dx.doi.org/10.4018/ijdcf.2018010101.

Texto completo da fonte
Resumo:
In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the cloud. The strategy improved the D-S evidence theory to verify the security of the peer nodes in cloud, including the calculation, combination and transfer of the direct trust and recommended trust. This solved the security problems brought on by evidence conflicts in trust combination and provides security insurance for single sign-on solutions in the cloud.
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Leahy, Darragh, and Christina Thorpe. "Zero Trust Container Architecture (ZTCA)." International Conference on Cyber Warfare and Security 17, no. 1 (2022): 111–20. http://dx.doi.org/10.34190/iccws.17.1.35.

Texto completo da fonte
Resumo:
Containerisation is quickly becoming an accepted industry standard for development environments and Gartner, in a recent market forecast, estimated that by 2022 more than 75% of organisations will be using containers in production deployments. With this explosion in growth comes an added focus on security and best practices for using containers. The use of containers, in particular Docker containers, has altered some of the more traditional deployment paradigms by giving control of deployments to the development teams. This has massively benefited the DevOps release cycle, but at the expense of many mature security and review processes that are integrated into traditional deployments. Like all systems, containers need frameworks to guide best practices for deployments and to ensure mistakes are not made that increase the risk level or attack surface of an application or service using containers, or the containers themselves. Indeed, according to a recent presentation during DevSecCon24 by Justin Cormack, Security Lead at Docker Inc., Cormack believes most security issues related to Docker are due to misconfiguration rather than direct exploit. While work has been previously conducted with regards to container security and separately applying Zero Trust Networking Architecture to containers, in this work we will investigate the security state of a default deployment of the Docker container engine on Linux and analyse how the principals of Zero Trust Architecture can be extended beyond the domain of networking, distilled into a ”Zero Trust Containers Architecture” and applied to secure Docker deployments. In order to determine this, research was conducted into the current state of Docker security and Zero Trust Architecture. Practical and theoretical attacks were reviewed against a default Docker deployment to identify common themes and areas of issue. Results were used to advise a generalised trust-based framework which was then used to analyse a Docker deployment and validate mitigation of a selection of the identified attacks, proving out the concept of the proposed “Zero Trust Container Architecture” framework.
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Syed, (Shawon) M. Rahman, and Lackey Robert. "E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES." International Journal of Network Security & Its Applications (IJNSA) 5, no. 2 (2013): 193–210. https://doi.org/10.5281/zenodo.4059648.

Texto completo da fonte
Resumo:
Small business e-commerce websites make an excellent target for malicious attacks. Small businesses do not have the resources needed to effectively deal with attacks. Large and some mid-size organization have teams that are dedicated to dealing with security incidents and preventing future attacks. Most small businesses do not have the capabilities of dealing with incidents the way large organizations do. Security of e-commerce websites is essential for compliance with laws and regulations as well as gaining and maintaining the trust of consumers, partners and stakeholders. Many security standards have been established by various organizations to help guide security of small business servers, however, many of those standards or guidelines are too costly or time consuming. This paper1 will discuss how attacks are carried out and how a small business can effectively secure their networks with minimum cost.
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

D., Maheswari, and G. K. Kamalam Dr. "ART: AN ATTACK-RESISTANT TRUST MANAGEMENT SCHEME FOR MISBEHAVIOR DETECTION IN VANET." International Journal of Advanced Trends in Engineering and Technology 1, no. 2 (2017): 29–34. https://doi.org/10.5281/zenodo.345656.

Texto completo da fonte
Resumo:
Vehicular ad hoc networks (VANETs) have the potential to transform the way in which the people can travel through the creation of a safe interoperable wireless communication networks (cars, buses, traffic signals, cell phones, and other devices). In Base Line Weighted Voting (BLWV) method, it calculates only the trust value on each node by separate weight calculation of nodes. The proposed Attack-Resistant Trust Management (ART) scheme evaluates the trustworthiness of traffic data and vehicle nodes in VANETs and also easily detects the various malicious attacks. In ART scheme, Dumpster’s rule is applied to combine the local evidences collected by a mobile node and from the other external mobile nodes. The trustworthiness of data and nodes are evaluated into two separate metrics, Data trust and Node trust. The data trust is used to assess the traffic data and also reports in what extend the traffic data are trustworthy and the node trust indicates how the nodes are trustworthy. The trust management theme is applicable to a wide range of VANET applications in order to improve the traffic safety, mobility, and environmental protection. The effectiveness and efficiency of the ART scheme is validated through extensive experiments. This scheme accurately evaluates the trustworthiness of data and the nodes in VANETs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Ma, Zhe, Xuhesheng Chen, Tiejiang Sun, Xukang Wang, Ying Cheng Wu, and Mengjie Zhou. "Blockchain-Based Zero-Trust Supply Chain Security Integrated with Deep Reinforcement Learning for Inventory Optimization." Future Internet 16, no. 5 (2024): 163. http://dx.doi.org/10.3390/fi16050163.

Texto completo da fonte
Resumo:
Modern supply chain systems face significant challenges, including lack of transparency, inefficient inventory management, and vulnerability to disruptions and security threats. Traditional optimization methods often struggle to adapt to the complex and dynamic nature of these systems. This paper presents a novel blockchain-based zero-trust supply chain security framework integrated with deep reinforcement learning (SAC-rainbow) to address these challenges. The SAC-rainbow framework leverages the Soft Actor–Critic (SAC) algorithm with prioritized experience replay for inventory optimization and a blockchain-based zero-trust mechanism for secure supply chain management. The SAC-rainbow algorithm learns adaptive policies under demand uncertainty, while the blockchain architecture ensures secure, transparent, and traceable record-keeping and automated execution of supply chain transactions. An experiment using real-world supply chain data demonstrated the superior performance of the proposed framework in terms of reward maximization, inventory stability, and security metrics. The SAC-rainbow framework offers a promising solution for addressing the challenges of modern supply chains by leveraging blockchain, deep reinforcement learning, and zero-trust security principles. This research paves the way for developing secure, transparent, and efficient supply chain management systems in the face of growing complexity and security risks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Nitta, Mellania Ariya, and Nuruni Ika Kusuma Wardhani. "Kepercayaan dalam Memediasi Keamanan dan Persepsi Resiko terhadap Minat Beli Konsumen." Journal of Management and Bussines (JOMB) 4, no. 2 (2022): 1105–20. http://dx.doi.org/10.31539/jomb.v4i2.5046.

Texto completo da fonte
Resumo:
This study aims to determine the effect of trust as a mediating variable between security and perceived risk on consumer buying interest, and to determine the effect between security, perceived risk, and trust on consumer buying interest in Lazada consumers in Surabaya. This research method is quantitative. The sample in this study was 90 respondents using a non-probability sampling technique and the analytical tool used was SmartPLS 3.0. The results showed, a) that the path coefficient value of the security variable on trust was 0.512 and the p-value was 0.001, so the results of the study were positive and significant; b) the value of the path coefficient of the risk perception variable on trust is -0.029 and the p-value is 0.748, so the results of the study are negative and not significant; c) the value of the path coefficient of the trust variable on buying interest is 0.270 and the p-value is 0.109, so the results of the study are positive and not significant; d) the value of the path coefficient of the security variable on buying interest is 0.457 and the p-value is 0.001, so the results of the study are positive and significant; e) the value of the path coefficient of the risk perception variable on purchase intention is -0.179 and the p-value is 0.010, so the results of this study are negative and significant. In conclusion, of the 7 existing hypotheses, only 3 hypotheses have an influence including security affecting trust, security influencing purchase intention, and perceived risk influencing buying interest. While the other 4 hypotheses have no effect, namely risk perception has no effect on trust, trust has no effect on purchase intention, trust does not mediate the relationship between security and purchase intention, and trust does not mediate the relationship between perceived risk and purchase intention.&#x0D; Keywords: Security, Trust, Purchase Intention, Perceived Risk
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

S.Rajaram. "Secure Routing Path Using Trust Values for Wireless Sensor Networks." International Journal on Cryptography and Information Security (IJCIS) 4, no. 2 (2014): 10. https://doi.org/10.5281/zenodo.7407765.

Texto completo da fonte
Resumo:
Traditional cryptography-based security mechanisms such as authentication and authorization are not effective against insider attacks like wormhole, sinkhole, selective forwarding attacks, etc., Trust based approaches have been widely used to counter insider attacks in wireless sensor networks. It provides a quantitative way to evaluate the trustworthiness of sensor nodes. An untrustworthy node can wreak considerable damage and adversely affect the quality and reliability of data. Therefore, analyzing the trust level of a node is important. In this paper we focused about indirect trust mechanism, in which each node monitors the forwarding behavior of its neighbors in order to detect any node that behaves selfishly and does not forward the packets it receives. For this, we used a link state routing protocol based indirect trusts which forms the shortest route and finds the best trustworthy route among them by comparing the values of all the calculated route trusts as for each route present in the network. And finally, we compare our work with similar routing protocols and show its advantages over them.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!