11,351 research outputs found

    The SECURE collaboration model

    Get PDF
    The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems

    A Forensically Sound Adversary Model for Mobile Devices

    Full text link
    In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device

    A Graph-Based Approach to Address Trust and Reputation in Ubiquitous Networks

    Get PDF
    The increasing popularity of virtual computing environments such as Cloud and Grid computing is helping to drive the realization of ubiquitous and pervasive computing. However, as computing becomes more entrenched in everyday life, the concepts of trust and risk become increasingly important. In this paper, we propose a new graph-based theoretical approach to address trust and reputation in complex ubiquitous networks. We formulate trust as a function of quality of a task and time required to authenticate agent-to-agent relationship based on the Zero-Common Knowledge (ZCK) authentication scheme. This initial representation applies a graph theory concept, accompanied by a mathematical formulation of trust metrics. The approach we propose increases awareness and trustworthiness to agents based on the values estimated for each requested task, we conclude by stating our plans for future work in this area

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    Incommensurable worldviews? Is public use of complementary and alternative medicines incompatible with support for science and conventional medicine?

    Get PDF
    Proponents of controversial Complementary and Alternative Medicines, such as homeopathy, argue that these treatments can be used with great effect in addition to, and sometimes instead of, ?conventional? medicine. In doing so, they accept the idea that the scientific approach to the evaluation of treatment does not undermine use of and support for some of the more controversial CAM treatments. For those adhering to the scientific canon, however, such efficacy claims lack the requisite evidential basis from randomised controlled trials. It is not clear, however, whether such opposition characterises the views of the general public. In this paper we use data from the 2009 Wellcome Monitor survey to investigate public use of and beliefs about the efficacy of a prominent and controversial CAM within the United Kingdom, homeopathy. We proceed by using Latent Class Analysis to assess whether it is possible to identify a sub-group of the population who are at ease in combining support for science and conventional medicine with use of CAM treatments, and belief in the efficacy of homeopathy. Our results suggest that over 40% of the British public maintain positive evaluations of both homeopathy and conventional medicine simultaneously. Explanatory analyses reveal that simultaneous support for a controversial CAM treatment and conventional medicine is, in part, explained by a lack of scientific knowledge as well as concerns about the regulation of medical research
    corecore