388,442 research outputs found

    A Formal Framework for Modeling Trust and Reputation in Collective Adaptive Systems

    Get PDF
    Trust and reputation models for distributed, collaborative systems have been studied and applied in several domains, in order to stimulate cooperation while preventing selfish and malicious behaviors. Nonetheless, such models have received less attention in the process of specifying and analyzing formally the functionalities of the systems mentioned above. The objective of this paper is to define a process algebraic framework for the modeling of systems that use (i) trust and reputation to govern the interactions among nodes, and (ii) communication models characterized by a high level of adaptiveness and flexibility. Hence, we propose a formalism for verifying, through model checking techniques, the robustness of these systems with respect to the typical attacks conducted against webs of trust.Comment: In Proceedings FORECAST 2016, arXiv:1607.0200

    A Secure and Fair Resource Sharing Model for Community Clouds

    Get PDF
    Cloud computing has gained a lot of importance and has been one of the most discussed segment of today\u27s IT industry. As enterprises explore the idea of using clouds, concerns have emerged related to cloud security and standardization. This thesis explores whether the Community Cloud Deployment Model can provide solutions to some of the concerns associated with cloud computing. A secure framework based on trust negotiations for resource sharing within the community is developed as a means to provide standardization and security while building trust during resource sharing within the community. Additionally, a model for fair sharing of resources is developed which makes the resource availability and usage transparent to the community so that members can make informed decisions about their own resource requirements based on the resource usage and availability within the community. Furthermore, the fair-share model discusses methods that can be employed to address situations when the demand for a resource is higher than the resource availability in the resource pool. Various methods that include reduction in the requested amount of resource, early release of the resources and taxing members have been studied, Based on comparisons of these methods along with the advantages and disadvantages of each model outlined, a hybrid method that only taxes members for unused resources is developed. All these methods have been studied through simulations

    Climate change adaptation and vulnerability assessment of water resources systems in developing countries: a generalized framework and a feasibility study in Bangladesh

    Get PDF
    Water is the primary medium through which climate change influences the Earth’s ecosystems and therefore people’s livelihoods and wellbeing. Besides climatic change, current demographic trends, economic development and related land use changes have direct impact on increasing demand for freshwater resources. Taken together, the net effect of these supply and demand changes is affecting the vulnerability of water resources. The concept of ‘vulnerability’ is not straightforward as there is no universally accepted approach for assessing vulnerability. In this study, we review the evolution of approaches to vulnerability assessment related to water resources. From the current practices, we identify research gaps, and approaches to overcome these gaps a generalized assessment framework is developed. A feasibility study is then presented in the context of the Lower Brahmaputra River Basin (LBRB). The results of the feasibility study identify the current main constraints (e.g., lack of institutional coordination) and opportunities (e.g., adaptation) of LBRB. The results of this study can be helpful for innovative research and management initiatives and the described framework can be widely used as a guideline for the vulnerability assessment of water resources systems, particularly in developing countries

    Deeper Roots: Strengthening Community Tenure Security and Community Livelihoods

    Get PDF
    Utilizes concrete experiences from Bolivia, Colombia, Brazil, South Africa, Tanzania, India, Nepal, Indonesia, and the Philippines to highlight emerging issues, and offers strategies for advancing community forest tenure security

    Stewarding Biodiversity and Food Security in The Coral Triangle: Achievements, Challenges, and Lessons Learned

    Get PDF
    The management team of the US Agency for International Development (USAID)- supported Coral Triangle Support Partnership (CTSP) commissioned this report to take a qualitative look at the achievements, challenges, and lessons learned from investment in CTSP. CTSP is part of a broader USAID investment supporting the Coral Triangle Initiative on Coral Reefs, Fisheries, and Food Security (CTI-CFF), a six-nation effort to sustain vital marine and coastal resources in the Coral Triangle located in Southeast Asia and the Western Pacific

    Comprehensive Security Framework for Global Threats Analysis

    Get PDF
    Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios
    • …
    corecore