21,793 research outputs found
A trading model and security regime for mobile e-commerce via ad hoc wireless networking
Ad hoc wireless networking offers mobile computer users the prospect of trading
with others in their vicinity anywhere anytime. This thesis explores the potential
for developing such trading applications. A notable difficulty in designing their
security services is being unable to use trusted parties. No one can be guaranteed
present in each ad hoc wireless network session. A side benefit is that their costs
don't have to be paid for.
A reference model is defined for ad hoc m-commerce and a threat model is for-
mulated of its security vulnerabilities. They are used to elicit security objectives
and requirements for such trading systems. Possible countermeasures to address
the threats are critically analysed and used to design security services to mitigate
them. They include a self-organised P2P identity support scheme using PGP cer-
tificates; a distributed reputation system backed by sanctions; a group membership
service based on membership vouchers, quorate decisions by some group members
and partial membership lists; and a security warning scheme.
Security analysis of the schemes shows that they can mitigate the threats to an
adequate degree to meet the trading system's security objectives and requirements
if users take due care when trading within it. Formal verification of the system
shows that it satisfies certain safety properties
Achieving cybersecurity in blockchain-based systems: a survey
With The Increase In Connectivity, The Popularization Of Cloud Services, And The Rise Of The Internet Of Things (Iot), Decentralized Approaches For Trust Management Are Gaining Momentum. Since Blockchain Technologies Provide A Distributed Ledger, They Are Receiving Massive Attention From The Research Community In Different Application Fields. However, This Technology Does Not Provide With Cybersecurity By Itself. Thus, This Survey Aims To Provide With A Comprehensive Review Of Techniques And Elements That Have Been Proposed To Achieve Cybersecurity In Blockchain-Based Systems. The Analysis Is Intended To Target Area Researchers, Cybersecurity Specialists And Blockchain Developers. For This Purpose, We Analyze 272 Papers From 2013 To 2020 And 128 Industrial Applications. We Summarize The Lessons Learned And Identify Several Matters To Foster Further Research In This AreaThis work has been partially funded by MINECO, Spain grantsTIN2016-79095-C2-2-R (SMOG-DEV) and PID2019-111429RB-C21 (ODIO-COW); by CAM, Spain grants S2013/ICE-3095 (CIBERDINE),P2018/TCS-4566 (CYNAMON), co-funded by European Structural Funds (ESF and FEDER); by UC3M-CAM grant CAVTIONS-CM-UC3M; by the Excellence Program for University Researchers, Spain; and by Consejo Superior de Investigaciones CientĂficas (CSIC), Spain under the project LINKA20216 (âAdvancing in cybersecurity technologiesâ, i-LINK+ program)
Trusted operational scenarios - Trust building mechanisms and strategies for electronic marketplaces.
This document presents and describes the trusted operational scenarios, resulting from the research and work carried out in Seamless project. The report presents identified collaboration habits of small and medium enterprises with low e-skills, trust building mechanisms and issues as main enablers of online business relationships on the electronic marketplace, a questionnaire analysis of the level of trust acceptance and necessity of trust building mechanisms, a proposal for the development of different strategies for the different types of trust mechanisms and recommended actions for the SEAMLESS project or other B2B marketplaces.trust building mechanisms, trust, B2B networks, e-marketplaces
Impact of Mobile and Wireless Technology on Healthcare Delivery services
Modern healthcare delivery services embrace the use of leading edge technologies and new
scientific discoveries to enable better cures for diseases and better means to enable early
detection of most life-threatening diseases. The healthcare industry is finding itself in a
state of turbulence and flux. The major innovations lie with the use of information
technologies and particularly, the adoption of mobile and wireless applications in
healthcare delivery [1]. Wireless devices are becoming increasingly popular across the
healthcare field, enabling caregivers to review patient records and test results, enter
diagnosis information during patient visits and consult drug formularies, all without the
need for a wired network connection [2]. A pioneering medical-grade, wireless
infrastructure supports complete mobility throughout the full continuum of healthcare
delivery. It facilitates the accurate collection and the immediate dissemination of patient
information to physicians and other healthcare care professionals at the time of clinical
decision-making, thereby ensuring timely, safe, and effective patient care. This paper
investigates the wireless technologies that can be used for medical applications, and the
effectiveness of such wireless solutions in a healthcare environment. It discusses challenges
encountered; and concludes by providing recommendations on policies and standards for
the use of such technologies within hospitals
Reputation in multi agent systems and the incentives to provide feedback
The emergence of the Internet leads to a vast increase in the number of interactions between parties that are completely alien to each other. In general, such transactions are likely to be subject to fraud and cheating. If such systems use computerized rational agents to negotiate and execute transactions, mechanisms that lead to favorable outcomes for all parties instead of giving rise to defective behavior are necessary to make the system work: trust and reputation mechanisms. This paper examines different incentive mechanisms helping these trust and reputation mechanisms in eliciting users to report own experiences honestly. --Trust,Reputation
- âŠ