89 research outputs found
Ready or Not? Protecting the Public's Health in the Age of Bioterrorism, 2006
Examines ten key indicators to evaluate state preparedness to respond to bioterrorist attacks and other public health emergencies. Evaluates the federal government's role and performance, and offers recommendations for improving readiness
Risk and trust management for online distributed system
This thesis investigated the problem of strategic manipulation of feedback attacks and proposed an approach that makes trust management systems sufficiently robust against feedback manipulation attacks. The new trust management system enables potential service consumers to determine the risk level of a service before committing to proceed with the transaction
Addressing the Issues of Coalitions and Collusion in Multiagent Systems
In the field of multiagent systems, trust and reputation systems are intended to assist agents in finding trustworthy partners with whom to interact. Earlier work of ours identified in theory a number of security vulnerabilities in trust and reputation systems, weaknesses that might be exploited by malicious agents to bypass the protections offered by such systems. In this work, we begin by developing the TREET testbed, a simulation platform that allows for extensive evaluation and flexible experimentation with trust and reputation technologies. We use this testbed to experimentally validate the practicality and gravity of attacks against vulnerabilities. Of particular interest are attacks that are collusive in nature: groups of agents (coalitions) working together to improve their expected rewards. But the issue of coalitions is not unique to trust and reputation; rather, it cuts across a range of fields in multiagent systems and beyond. In some scenarios, coalitions may be unwanted or forbidden; in others they may be benign or even desirable. In this document, we propose a method for detecting coalitions and identifying coalition members, a capability that is likely to be valuable in many of the diverse fields where coalitions may be of interest. Our method makes use of clustering in benefit space (a high-dimensional space reflecting how agents benefit others in the system) in order to identify groups of agents who benefit similar sets of agents. A statistical technique is then used to identify which clusters contain coalitions. Experimentation using the TREET platform verifies the effectiveness of this approach. A series of enhancements to our method are also introduced, which improve the accuracy and robustness of the algorithm. To demonstrate how this broadly-applicable tool can be used to address domain-specific problems, we focus again on trust and reputation systems. We show how, by incorporating our work into one such system (the existing Beta Reputation System), we can provide resistance to collusion. We conclude with a detailed discussion of the value of our work for a wide range of environments, including a variety of multiagent systems and real-world settings
Shaping the Security Environment
Newport Paper No. 29, Shaping the Security Environment, edited by Derek S. Reveron, makes an important contribution to an unfolding debate on the global role of U.S. military forces in an era of transnational terrorism, failed or failing states, and globalization. Reveron, professor of national security decision making at the Naval War College, looks beyond the current conflicts in which the United States is involved to raise fundamental questions concerning the regional diplomatic roles of America’s combatant commanders (COCOMs) and, more generally, the entire array of non-warfighting functions that have become an increasingly important part of the day-to-day life of the American military as it engages a variety of partners or potential partners around the world.https://digital-commons.usnwc.edu/usnwc-newport-papers/1027/thumbnail.jp
Intelligent Learning Automata-based Strategies Applied to Personalized Service Provisioning in Pervasive Environments
Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, Grimstad, 201
Future of the Internet--and how to stop it
vi, 342 p. : ill. ; 25 cmLibro ElectrónicoOn January 9, 2007, Steve Jobs introduced the iPhone to an eager audience
crammed into San Francisco’s Moscone Center.1 A beautiful
and brilliantly engineered device, the iPhone blended three products
into one: an iPod, with the highest-quality screen Apple had ever produced;
a phone, with cleverly integrated functionality, such as voicemail
that came wrapped as separately accessible messages; and a device
to access the Internet, with a smart and elegant browser, and with
built-in map, weather, stock, and e-mail capabilities. It was a technical
and design triumph for Jobs, bringing the company into a market
with an extraordinary potential for growth, and pushing the industry
to a new level of competition in ways to connect us to each other and
to the Web.Includes bibliographical references (p. 249-328) and index
Acceso restringido a miembros del Consorcio de Bibliotecas Universitarias de Andalucía
Electronic reproduction. Palo Alto, Calif. : ebrary, 2009
Modo de acceso : World Wide Webpt. 1. The rise and stall of the generative Net --
Battle of the boxes --
Battle of the networks --
Cybersecurity and the generative dilemma --
pt. 2. After the stall --
The generative pattern --
Tethered appliances, software as service, and perfect enforcement --
The lessons of Wikipedia --
pt. 3. Solutions --
Stopping the future of the Internet : stability on a generative Net --
Strategies for a generative future --
Meeting the risks of generativity : Privacy 2.0.
Index32
Outbreaks: Protecting Americans From Infectious Diseases 2014
This report examines a range of infectious disease concerns. The report highlights a series of 10 indicators in each state that, taken collectively, offer a composite snapshot of strengths and vulnerabilities across the health system. These indicators help illustrate the types of policy fundamentals that are important to have in place not just to prevent the spread of disease in the first place but also to detect, diagnose and respond to outbreaks. In addition, the report examines key areas of concern in the nation's ability to prevent and control infectious diseases and offers recommendations for addressing these gaps. The Outbreaks report provides the public, policymakers and a broad and diverse set of groups involved in public health and the healthcare system with an objective, nonpartisan, independent analysis of the status of infectious disease policies; encourages greater transparency and accountability of the system; and recommends ways to assure the public health and healthcare systems meet today's needs and work across borders to accomplish their goals
- …