216,482 research outputs found

    Autonomic Database Management: State of the Art and Future Trends

    Get PDF
    In recent years, Database Management Systems (DBMS) have increased significantly in size and complexity, increasing the extent to which database administration is a time-consuming and expensive task. Database Administrator (DBA) expenses have become a significant part of the total cost of ownership. This results in the need to develop Autonomous Database Management systems (ADBMS) that would manage themselves without human intervention. Accordingly, this paper evaluates the current state of autonomous database systems and identifies gaps and challenges in the achievement of fully autonomic databases. In addition to highlighting technical challenges and gaps, we identify one human factor, gaining the trust of DBAs, as a major obstacle. Without human acceptance and trust, the goal of achieving fully autonomic databases cannot be realized

    Diversity Management and Trust: Systematic Literature Review

    Get PDF
    Purpose: The main aim of the paper is to identify and evaluate the state of the art in research on relationship between the concepts of diversity management and trust. The overarching question is what are the key contributions of the literature to deliver support to linkage between these two concepts. The literature analysis is also aimed at organising existing knowledge and identifying the key problems, trends and gaps in research output. Design/methodology/approach: Based on a systematic review of the literature, a content analysis on 18 peer-reviewed journal articles has been carried out. The Scopus and Web of Science Core Collection databases are used as a source for the sampling process. Findings: First of all, the results of the study allow to conclude that very few publications ranked as business and social scienc-es comprise together diversity management and trust. Thus, the analysed area seems to be an attractive field for further research. Among existing literature seven key research areas were identi-fied, representing different approaches to the relationship between trust and diversity management. Research and practical limitations/implications: The Scopus and Web of Science Core Collection databases, which were used to identify the publications analysed, do not contain all publications in the field of the study. Different languages of full text constituted an additional obstacle. Originality/value: The paper contributes to the diversity manage-ment and trust literature in three ways. First, it discovers a research gap in the field of linkage between trust and diversity management. Secondly, it organises existing body of knowledge and finally it identifies the key problems and trends in research output. Paper type: theoretical, literature review

    Impact of Sybil attacks on Web services trust assessment

    Get PDF
    © 2015 IEEE. This paper discusses how Sybil attacks can undermine trust management systems and how to respond to these attacks using advanced techniques such as credibility and probabilistic databases. In such attacks end-users have purposely different identities and hence, can provide inconsistent ratings over the same Web Services. Many existing approaches rely on arbitrary choices to filter out Sybil users and reduce their attack capabilities. However this turns out inefficient. Our approach relies on non-Sybil credible users who provide consistent ratings over Web services and hence, can be trusted. To establish these ratings and debunk Sybil users techniques such as fuzzy-clustering, graph search, and probabilistic databases are adopted. A series of experiments are carried out to demonstrate robustness of our trust approach in presence of Sybil attacks

    Sybil tolerance and probabilistic databases to compute web services trust

    Get PDF
    © Springer International Publishing Switzerland 2015. This paper discusses how Sybil attacks can undermine trust management systems and how to respond to these attacks using advanced techniques such as credibility and probabilistic databases. In such attacks end-users have purposely different identities and hence, can provide inconsistent ratings over the same Web Services. Many existing approaches rely on arbitrary choices to filter out Sybil users and reduce their attack capabilities. However this turns out inefficient. Our approach relies on non-Sybil credible users who provide consistent ratings over Web services and hence, can be trusted. To establish these ratings and debunk Sybil users techniques such as fuzzy-clustering, graph search, and probabilistic databases are adopted. A series of experiments are carried out to demonstrate robustness of our trust approach in presence of Sybil attacks

    DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

    Get PDF
    With the growing popularity of cloud computing, the exploitation of possible vulnerabilities grows at the same pace; the distributed nature of the cloud makes it an attractive target for potential intruders. Despite security issues delaying its adoption, cloud computing has already become an unstoppable force; thus, security mechanisms to ensure its secure adoption are an immediate need. Here, we focus on intrusion detection and prevention systems (IDPSs) to defend against the intruders. In this paper, we propose a Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention system (DCDIDP). Its goal is to make use of the resources in the cloud and provide a holistic IDPS for all cloud service providers which collaborate with other peers in a distributed manner at different architectural levels to respond to attacks. We present the DCDIDP framework, whose infrastructure level is composed of three logical layers: network, host, and global as well as platform and software levels. Then, we review its components and discuss some existing approaches to be used for the modules in our proposed framework. Furthermore, we discuss developing a comprehensive trust management framework to support the establishment and evolution of trust among different cloud service providers. © 2011 ICST

    How is Trust affected by a Leader’s failure on his role?

    Get PDF
    This study explores the trust concept on leadership and how it can affect employee’s behavior. The purpose of the paper is to discuss how leadership trust can be affected by a leader’s failure on his role. The research question is "How is trust affected by a leader’s failure on his role?” And it will lead us to test and validate the impact of leader’s trust on employee’s behavior and performance through organizations structures. In leadership, trust between superiors and followers plays a very important role. Since last decade, there has been a considerable increase in researching trust at the organizational level. Researchers and practitioners continue to recognize trust as an important factor in determining organizational success, organizational stability and the well-being of employees. Trust has also emerged as a central construct in a wide range of management studies including those focusing on performance. This is a conceptual paper, which explores the concepts of trust, behavior and performance, framed by leadership models. The literature review includes a documentary analysis of papers from the main scientific databases: Scopus and WOS, using the keywords leadership, trust, behavior and performance. As expected results we anticipate to confirm if leader’s trust within organization hierarchies will generate and be a key factor on behavior and thus lead to better performance from employees which will originate better results from their tasks and thus more efficiency which in turn will lead to high organizational performance.info:eu-repo/semantics/publishedVersio

    The Invisible Forest: Conservation Easement Databases and the End of the Clandestine Conservation of Natural Lands

    Get PDF
    Olmsted talks about invisible forest refers to forest lands -- and, for that matter, any other land types -- protected by a perpetual conservation easement, the existence and location of which are concealed from the public, whether deliberately or because of the opaque nature of the easement process. Because easements, like other forms of deeds, must be recorded at the local land registry or recorder\u27s office, they can never be made undiscoverable. But, despite the efforts of some states and conservation organizations to compile conservation easement data for public consumption, there are few functional systems that comprehensively track and provide easy access to conservation easement data
    • …
    corecore