89 research outputs found

    Information security and assurance : Proceedings international conference, ISA 2012, Shanghai China, April 2012

    Full text link

    Ready or Not? Protecting the Public's Health in the Age of Bioterrorism, 2006

    Get PDF
    Examines ten key indicators to evaluate state preparedness to respond to bioterrorist attacks and other public health emergencies. Evaluates the federal government's role and performance, and offers recommendations for improving readiness

    Risk and trust management for online distributed system

    Full text link
    This thesis investigated the problem of strategic manipulation of feedback attacks and proposed an approach that makes trust management systems sufficiently robust against feedback manipulation attacks. The new trust management system enables potential service consumers to determine the risk level of a service before committing to proceed with the transaction

    Addressing the Issues of Coalitions and Collusion in Multiagent Systems

    Get PDF
    In the field of multiagent systems, trust and reputation systems are intended to assist agents in finding trustworthy partners with whom to interact. Earlier work of ours identified in theory a number of security vulnerabilities in trust and reputation systems, weaknesses that might be exploited by malicious agents to bypass the protections offered by such systems. In this work, we begin by developing the TREET testbed, a simulation platform that allows for extensive evaluation and flexible experimentation with trust and reputation technologies. We use this testbed to experimentally validate the practicality and gravity of attacks against vulnerabilities. Of particular interest are attacks that are collusive in nature: groups of agents (coalitions) working together to improve their expected rewards. But the issue of coalitions is not unique to trust and reputation; rather, it cuts across a range of fields in multiagent systems and beyond. In some scenarios, coalitions may be unwanted or forbidden; in others they may be benign or even desirable. In this document, we propose a method for detecting coalitions and identifying coalition members, a capability that is likely to be valuable in many of the diverse fields where coalitions may be of interest. Our method makes use of clustering in benefit space (a high-dimensional space reflecting how agents benefit others in the system) in order to identify groups of agents who benefit similar sets of agents. A statistical technique is then used to identify which clusters contain coalitions. Experimentation using the TREET platform verifies the effectiveness of this approach. A series of enhancements to our method are also introduced, which improve the accuracy and robustness of the algorithm. To demonstrate how this broadly-applicable tool can be used to address domain-specific problems, we focus again on trust and reputation systems. We show how, by incorporating our work into one such system (the existing Beta Reputation System), we can provide resistance to collusion. We conclude with a detailed discussion of the value of our work for a wide range of environments, including a variety of multiagent systems and real-world settings

    Shaping the Security Environment

    Get PDF
    Newport Paper No. 29, Shaping the Security Environment, edited by Derek S. Reveron, makes an important contribution to an unfolding debate on the global role of U.S. military forces in an era of transnational terrorism, failed or failing states, and globalization. Reveron, professor of national security decision making at the Naval War College, looks beyond the current conflicts in which the United States is involved to raise fundamental questions concerning the regional diplomatic roles of America’s combatant commanders (COCOMs) and, more generally, the entire array of non-warfighting functions that have become an increasingly important part of the day-to-day life of the American military as it engages a variety of partners or potential partners around the world.https://digital-commons.usnwc.edu/usnwc-newport-papers/1027/thumbnail.jp

    Intelligent Learning Automata-based Strategies Applied to Personalized Service Provisioning in Pervasive Environments

    Get PDF
    Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, Grimstad, 201

    Future of the Internet--and how to stop it

    Get PDF
    vi, 342 p. : ill. ; 25 cmLibro ElectrónicoOn January 9, 2007, Steve Jobs introduced the iPhone to an eager audience crammed into San Francisco’s Moscone Center.1 A beautiful and brilliantly engineered device, the iPhone blended three products into one: an iPod, with the highest-quality screen Apple had ever produced; a phone, with cleverly integrated functionality, such as voicemail that came wrapped as separately accessible messages; and a device to access the Internet, with a smart and elegant browser, and with built-in map, weather, stock, and e-mail capabilities. It was a technical and design triumph for Jobs, bringing the company into a market with an extraordinary potential for growth, and pushing the industry to a new level of competition in ways to connect us to each other and to the Web.Includes bibliographical references (p. 249-328) and index Acceso restringido a miembros del Consorcio de Bibliotecas Universitarias de Andalucía Electronic reproduction. Palo Alto, Calif. : ebrary, 2009 Modo de acceso : World Wide Webpt. 1. The rise and stall of the generative Net -- Battle of the boxes -- Battle of the networks -- Cybersecurity and the generative dilemma -- pt. 2. After the stall -- The generative pattern -- Tethered appliances, software as service, and perfect enforcement -- The lessons of Wikipedia -- pt. 3. Solutions -- Stopping the future of the Internet : stability on a generative Net -- Strategies for a generative future -- Meeting the risks of generativity : Privacy 2.0. Index32

    Outbreaks: Protecting Americans From Infectious Diseases 2014

    Get PDF
    This report examines a range of infectious disease concerns. The report highlights a series of 10 indicators in each state that, taken collectively, offer a composite snapshot of strengths and vulnerabilities across the health system. These indicators help illustrate the types of policy fundamentals that are important to have in place not just to prevent the spread of disease in the first place but also to detect, diagnose and respond to outbreaks. In addition, the report examines key areas of concern in the nation's ability to prevent and control infectious diseases and offers recommendations for addressing these gaps. The Outbreaks report provides the public, policymakers and a broad and diverse set of groups involved in public health and the healthcare system with an objective, nonpartisan, independent analysis of the status of infectious disease policies; encourages greater transparency and accountability of the system; and recommends ways to assure the public health and healthcare systems meet today's needs and work across borders to accomplish their goals
    corecore