202,149 research outputs found

    HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree

    Get PDF
    Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer nodes into groups, communities, or clusters. However, managing additional multilayer topology increases maintenance overhead, especially in highly dynamic environments. In this paper, we present Social-like P2P systems (Social-P2Ps) for object discovery by self-managing P2P topology with human tactics in social networks. In Social-P2Ps, queries are routed intelligently even with limited cached knowledge and node connections. Unlike community-based P2P file-sharing systems, we do not intend to create and maintain peer groups or communities consciously. In contrast, each node connects to other peer nodes with the same interests spontaneously by the result of daily searches

    RELIANCE ATTITUDES OF FARMERS IN CHOOSING HYBRID AND NON-HYBRID SEEDS IN CORN FARMING (CASE STUDY IN THE DISTRICT OF PURI DISTRICT. MOJOKERTO, EAST JAVA)

    Get PDF
    The purpose of this study are: 1). Analyzed the attitude of the farmers trust in choosing Hybrid and Non-Hybrid seeds on corn farming. 2). Knowing the superior attributes of corn seed hybrid and non-hybrid is an option for farmers. 3). Analyzed the economic feasibility of farming of corn hybrid and non hybrid. The research method used analysis of Fishbein Multiattribute attitude models to detect first and secondary objectiveness, while the third objective economic analysis of farming used by an analysis of cost and revenue balance (Return and Cost Ratio). The finding are show 1). Farmers who consider the most important attributes in selecting seed corn hybrid (P-21), (Bisi-2) is the Production, Growing Power, Brand, Efficiency uses Fertilizer, Seed Availability and Seed Price. In the other side Resistant toward drought attributes deemed most farmers less important than other attributes. The most important attributes of corn seed non-hybrid (Local) is Seed Price, Growing Power, Production, Brand, Resistant toward drought and Efficiency uses Fertilizer. While Seed Availability attributes deemed most farmers less important than other attributes. 2). Superior attributes selected by farmers on farms using corn seed hybrid (P-21), (Bisi-2) are production, While that use corn seed non hybrid (local) are seed price.. 3). Corn farming that use seed hybrid (P-21) and (Bisi-2), more efficient from seed non hybrid (local), and economical beneficial with feasible to carried on

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    Security in online learning assessment towards an effective trustworthiness approach to support e-learning teams

    Get PDF
    (c) 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.This paper proposes a trustworthiness model for the design of secure learning assessment in on-line collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in Learning Management Systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a trustworthiness model is designed in order to conduct the guidelines of a holistic security model for on-line collaborative learning through effective trustworthiness approaches. In addition, since users' trustworthiness analysis involves large amounts of ill-structured data, a parallel processing paradigm is proposed to build relevant information modeling trustworthiness levels for e-Learning.Peer ReviewedPostprint (author's final draft

    Business or third sector? What are the dimensions and implications of researching and conceptualising the overlap between business and third sector?

    Get PDF
    This paper is designed to ‘problematise’ the business/third sector boundary in order to inform future research into third sector theorising or policy development. It sets out some of the reasons behind the development of the concepts of the ‘third sector’ and ‘social enterprise’ in the UK, and briefly shows the scope and limits of the different theories underpinning European and US-influenced research and practice. It also illustrates some of the many dimensions, motivations and values of the kinds of organisations to be found in this cross-over space, as well as the challenges and opportunities which this diversity creates for any future research or policy creation

    Psychological elements explaining the consumer's adoption and use of a website recommendation system: A theoretical framework proposal

    Get PDF
    The purpose of this paper is to understand, with an emphasis on the psychological perspective of the research problem, the consumer's adoption and use of a certain web site recommendation system as well as the main psychological outcomes involved. The approach takes the form of theoretical modelling. Findings: A conceptual model is proposed and discussed. A total of 20 research propositions are theoretically analyzed and justified. Research limitations/implications: The theoretical discussion developed here is not empirically validated. This represents an opportunity for future research. Practical implications: The ideas extracted from the discussion of the conceptual model should be a help for recommendation systems designers and web site managers, so that they may be more aware, when working with such systems, of the psychological process consumers undergo when interacting with them. In this regard, numerous practical reflections and suggestions are presented
    corecore