28 research outputs found

    Game theory for cooperation in multi-access edge computing

    Get PDF
    Cooperative strategies amongst network players can improve network performance and spectrum utilization in future networking environments. Game Theory is very suitable for these emerging scenarios, since it models high-complex interactions among distributed decision makers. It also finds the more convenient management policies for the diverse players (e.g., content providers, cloud providers, edge providers, brokers, network providers, or users). These management policies optimize the performance of the overall network infrastructure with a fair utilization of their resources. This chapter discusses relevant theoretical models that enable cooperation amongst the players in distinct ways through, namely, pricing or reputation. In addition, the authors highlight open problems, such as the lack of proper models for dynamic and incomplete information scenarios. These upcoming scenarios are associated to computing and storage at the network edge, as well as, the deployment of large-scale IoT systems. The chapter finalizes by discussing a business model for future networks.info:eu-repo/semantics/acceptedVersio

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Advances in the sociology of trust and cooperation: theory, experiments, and field studies

    Get PDF
    The problem of cooperation and social order is one of the core issues in the social sciences. The key question is how humans, groups, institutions, and countries can avoid or overcome the collective good dilemmas that could lead to a Hobbesian war of all against all. Using the general set of social dilemmas as a paradigmatic example, rigorous formal analysis can stimulate scientific progress in several ways. The book, consisting of original articles, provides state of the art examples of research along these lines: theoretical, experimental, and field studies on trust and cooperation. The theoretical work covers articles on trust and control, reputation formation, and paradigmatic articles on the benefits and caveats of abstracting reality into models. The experimental articles treat lab based tests of models of trust and reputation, and the effects of the social and institutional embeddedness on behavior in cooperative interactions and possibly emerging inequalities. The field studies test these models in applied settings such as cooperation between organizations, informal care, and different kinds of collaboration networks. The book will be exemplary for rigorous sociology and social sciences more in general in a variety of ways: There is a focus on effects of social conditions, in particular different forms of social and institutional embeddedness, on social outcomes. Theorizing about and testing of effects of social contexts on individual and group outcomes is one of the main aims of sociological research. Modelling efforts include formal explications of micro-macro links that are typically easily overlooked when argumentation is intuitive and impressionistic Extensive attention is paid to unintended effects of intentional behavior, another feature that is a direct consequence of formal theoretical modelling and in-depth data-analyses of the social processe

    Advances in the Sociology of Trust and Cooperation

    Get PDF
    The book identifies conditions for trust and cooperation. It highlights unintended consequences of individually rational behavior, and shows how trust and cooperation change dependent on social embeddedness. Such analyses inspire experimental tests in lab conditions, but also tests through empirical applications in field studies. The results of this mixed-method approach can in turn be used to inspire further theoretical work

    Trust Establishment Mechanisms for Distributed Service Environments

    Get PDF
    The aim and motivation of this dissertation can be best described in one of the most important application fields, the cloud computing. It has changed entire business model of service-oriented computing environments in the last decade. Cloud computing enables information technology related services in a more dynamic and scalable way than before – more cost-effective than before due to the economy of scale and of sharing resources. These opportunities are too attractive for consumers to ignore in today’s highly competitive service environments. The way to realise these opportunities, however, is not free of obstacles. Services offered in cloud computing environments are often composed of multiple service components, which are hosted in distributed systems across the globe and managed by multiple parties. Potential consumers often feel that they lose the control over their data, due to the lack of transparent service specification and unclear security assurances in such environments. These issues encountered by the consumers boiled down to an unwillingness to depend on the service providers regarding the services they offer in the marketplaces. Therefore, consumers have to be put in a position where they can reliably assess the dependability of a service provider. At the same time, service providers have to be able to truthfully present the service-specific security capabilities. If both of these objectives can be achieved, consumers have a basis to make well-founded decisions about whether or not to depend on a particular service provider out of many alternatives. In this thesis, computational trust mechanisms are leveraged to assess the capabilities and evaluate the dependability of service providers. These mechanisms, in the end, potentially support consumers to establish trust on service providers in distributed service environments, e.g., cloud computing. In such environments, acceptable quality of the services can be maintained if the providers possess required capabilities regarding different service-specific attributes, e.g., security, performance, compliance. As services in these environments are often composed of multiple services, subsystems and components, evaluating trustworthiness of the service providers based on the service-specific attributes is non-trivial. In this vein, novel mechanisms are proposed for assessing and evaluating the trustworthiness of service providers considering the trustworthiness of composite services. The scientific contributions towards those novel mechanisms are summarised as follows: • Firstly, we introduce a list of service-specific attributes, QoS+ [HRM10, HHRM12], based on a systematic and comprehensive analysis of existing literatures in the field of cloud computing security and trust. • Secondly, a formal framework [SVRH11, RHMV11a, RHMV11b] is proposed to analyse the composite services along with their required service-specific attributes considering consumer requirements and represent them in simplified meaningful terms, i.e., Propositional Logic Terms (PLTs). • Thirdly, a novel trust evaluation framework CertainLogic [RHMV11a, RHMV11b, HRHM12a, HRHM12b] is proposed to evaluate the PLTs, i.e., capabilities of service providers. The framework provides computational operators to evaluate the PLTs, considering that uncertain and conflicting information are associated with each of the PLTs and those information can be derived from multiple sources. • Finally, harnessing these technical building blocks we present a novel trust management architecture [HRM11] for cloud computing marketplaces. The architecture is designed to support consumers in assessing and evaluating the trustworthiness of service providers based on the published information about their services. The novel contributions of this thesis are evaluated using proof-of-concept-system, prototype implementations and formal proofs. The proof-of-concept-system [HRMV13, HVM13a, HVM13b] is a realisation of the proposed architecture for trust management in cloud marketplaces. The realisation of the system is implemented based on a self-assessment framework, proposed by the Cloud Security Alliance, where the formal framework and computational operators of CertainLogic are applied. The realisation of the system enables consumers to evaluate the trustworthiness of service providers based on their published datasets in the CSA STAR. A number of experiments are conducted in different cloud computing scenarios leveraging the datasets in order to demonstrate the technical feasibility of the contributions made in this thesis. Additionally, the prototype implementations of CertainLogic framework provide means to demonstrate the characteristics of the computational operators by means of various examples. The formal framework as well as computational operators of CertainLogic are validated against desirable mathematical properties, which are supported by formal algebraic proofs

    Trademark and Unfair Competition Conflicts

    Get PDF
    This book will be of interest for all jurists doing research and working practically in intellectual property law and international economic law. It should be an element of the base stock for every law school library and specialized law firm. This title is available as Open Access

    The International Handbook of Social Enterprise Law

    Get PDF
    This open-access book brings together international experts who shed new light on the status of social enterprises, benefit corporations and other purpose-driven companies. The respective chapters take a multidisciplinary approach (combining law, philosophy, history, sociology and economics) and provide valuable insights on fostering social entrepreneurship and advancing the common good. In recent years, we have witnessed a significant shift of how business activities are conducted, mainly through the rise of social enterprises. In an effort to target social problems at their roots, social entrepreneurs create organizations that bring transformative social changes by considering, among others, ethical, social, and environmental factors. A variety of social enterprise models are emerging internationally and are proving their vitality and importance. But what does the term “social enterprise” mean? What are its roots? And how does it work in practice within the legal framework of any country? This handbook attempts to answer these questions from a theoretical, historical, and comparative perspective, bringing together 44 contributions written by 71 expert researchers and practitioners in this field. The first part provides an overview of the social enterprise movement, its evolution, and the different forms entities can take to meet global challenges, overcoming the limits of what governments and states can do. The second part focuses on the emergence of benefit corporations and the growing importance of sustainability and societal values, while also analyzing their different legal forms and adaptation to their regulatory environment. In turn, the last part presents the status quo of purpose-driven companies in 36 developed and emerging economies worldwide. This handbook offers food for thought and guidance for everyone interested in this field. It will benefit practitioners and decision-makers involved in social and community organizations, as well as in international development and, more generally speaking, social sciences and economics

    Sustainable Development in India

    Get PDF
    This book explores and interrogates the food–water–energy nexus, arguably the most crucial factor in sustaining India’s economic development. The book sheds light on different experiences faced in states across India, including the consequences of electricity tariff reforms and related policies on irrigated agriculture. Part 1 focuses on the historical development of agriculture and social change in India, with special reference to the mode of responses and adaptations in social systems against the inherent low and erratic rainfall and resulting water stress in India during the pre-colonial period. Additionally, it investigates how colonial development destroyed social systems and discusses future development prospects. Part 2 discusses contemporary issues of agriculture and social change in India. A comprehensive examination of various important issues related to South Asian agricultural development in the past and in the present, this book will be a valuable reference for researchers of Asian development, sustainable development, environmental policy, South Asian Studies and Development Studies
    corecore