8 research outputs found

    Matrix powers algorithms for trust evaluation in PKI architectures

    Get PDF
    This paper deals with the evaluation of trust in public-key infrastructures. Different trust models have been proposed to interconnect the various PKI components in order to propagate the trust between them. In this paper we provide a new polynomial algorithm using linear algebra to assess trust relationships in a network using different trust evaluation schemes. The advantages are twofold: first the use of matrix computations instead of graph algorithms provides an optimized computational solution; second, our algorithm can be used for generic graphs, even in the presence of cycles. Our algorithm is designed to evaluate the trust using all existing (finite) trust paths between entities as a preliminary to any exchanges between PKIs. This can give a precise evaluation of trust, and accelerate for instance cross-certificate validation

    Private Multi-party Matrix Multiplication and Trust Computations

    Full text link
    This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.Comment: Pierangela Samarati. SECRYPT 2016 : 13th International Conference on Security and Cryptography, Lisbonne, Portugal, 26--28 Juillet 2016. 201

    Phishing attacks root causes

    Get PDF

    A Review on Various Trust Models in Cloud Environment

    Get PDF

    Trust management techniques for the internet of things: A survey

    Get PDF
    A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be leveraged for entertainment, security, and most importantly user trust. Yet, trust is an imperative obstruction that may hinder the IoT growth and even delay the substantial squeeze of a number of applications. In this survey, an extensive analysis of trust management techniques along with their pros and cons is presented in a different context. In comparison with other surveys, the goal is to provide a systematic description of the most relevant trust management techniques to help researchers understand that how various systems fit together to bring preferred functionalities without examining different standards. Besides, the lessons learned are presented, and the views are argued regarding the primary goal trust which is likely to play in the future Internet. 2018 IEEE.This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No. 2018-0-01411, A Micro-Service IoTWare Framework Technology Development for Ultra small IoT Device).Scopus2-s2.0-8506427487

    The intention to adopt model of infrastructure as a service-based e-learning in higher education institutions in Nigeria

    Get PDF
    The global demand for providing education for all in the context of Nigerian Higher Education Institutions signifies the urgent need for an effective and efficient method of delivering e-learning content. Presently, the developed countries are adopting Cloud-Based e-learning for its cost reduction, security, scalability, and the availability of e-learning content 24/7. However, the lack of adoption of the Infrastructure as-a Service-Based E-learning faces a threat to the availability and sustainability of e-learning in Nigeria. Thus, the limited studies on its adoption further demonstrate this. Therefore, this study aims to investigate the factors that influence the Intention to adopt IaaSBEL from the perspective of the ICT directorates top managers. PLS-SEM was used to analyse the data generated from the questionnaire, while interview data were analysed using a thematic approach. The statistical results demonstrated that Relative Advantage, Cost Savings, Service Provider Support, and Government Support were significantly supported while Compatibility, Trust, Security, Top Management Support, and Competitive Pressure were not supported. The moderating variable (Government Support) statistical results show that Relative Advantage was positively supported while Cost Savings and Trust were negatively supported. The findings of this study further demonstrated the significance of the adopted variables as capable of influencing the perception of ICT directorates’ top managers' Intention to adopt the IaaSBEL model based on the TOE and DOI theories, with the addition of other external variables. However, the study observed some limitations with regards to the ICT infrastructure and policies in attaining education for all in Nigeria despite gender, financial, and location constraints. The study further contributes to the theory and practice of IS as well as recommendations to policy makers and cloud vendors. Also, effective e-learning would be available to staff and students towards reducing the budgetary constraints, hence, impacting the society
    corecore