13 research outputs found

    A model of trust applied to the management ofinformation technology

    Get PDF
    This work presents a model of trust as it relates to the management of informationtechnology (IT). We comment on the definition of trust as applied to contemporarybusiness environments, and discuss the associated risks due to the complexity of modernglobalized relationships. This work focuses on IT management, emphasizing the necessityof aligning organizational strategies with a company’s activities as recent studies haveconcluded that organizations that exhibit “business-focused” IT management are subjectto less risk. In this context, our proposed model enables the evaluation of trust as itrelates to IT management, by means of metrics that are related to business factors. Afield application of this model demonstrates the relevance of measuring trust as a meansto mitigate business risks related to IT management

    A STRUCTURE TO ASSIST COLLECTION OF CLOUD PROVISION PROVIDERS

    Get PDF
    Cloud-computing is a developing concept, by which new providers and services information are often entering existence, offering services of comparable functionality. Trust in addition to status is important concepts within online applications. They have produced easy selection appropriate to picking of consistent agent for electronic transactions. We   present a method referred to as choice of cloud firms that mixes reliability in addition to competence for estimation of chance of interaction which estimates supposed volume of interaction risk by way of mixing reliability in addition to competence of cloud provider. Reliability is computed from personal encounters that's acquired completely through direct relations otherwise from feedbacks connected with reputations of vendors.  Competence is assessed based on transparency within provider service level contracts guarantees

    AN EFFECTIVE APPROACH FOR SUPPORTING CLOUD SERVICE PROVIDER SELECTION

    Get PDF
    Computing will permit improved resource utilization by means of multiplexing similar physical resource between several tenants. Between numerous issues that prohibited companies from shift in their business towards public clouds, security is the most important one. Recent progression made within computation, storage as well as network access have assisted speedy development in cloud marketplace. Cloud For managing of customers in consistently identifying best service provider, our work will introduce a framework that combines trustworthiness as well as competence to approximate risk of interaction. The proposed structure estimates reliability regarding context-specific, dynamic trust as well as reputation feed backs and it additionally computes competence of service provider regarding transparency of service level agreements and will estimate perceived interaction risk by means of combining trustworthiness as well as competence of cloud provider. We attention on selection of reliable as well as competent service provider for business outsourcing and introduce an effective model that facilitates selection of reliable as well as capable service provider

    Security, Privacy'); DROP TABLE users; -- and Forced Trust in the Information Age?

    Get PDF
    In this study, we discuss forced trust in the context of information systems, information society and surveillance. Trust definitions and concepts pertinent to the discussion are examined and portrayed with case examples of forced trust in different situations that make up the information society. As the forced trust appears mostly in the governmental information systems, we reflected the concept from the security and privacy point-of-view that are important for the users of such systems in the current age of information. We portray the trust landscape of critical governmental information systems and discuss forced trust in the context of Internet infrastructure and mass surveillance. We provide a glimpse of an information society that combines security, trust, and privacy, while also providing discussion on what kind of trust dynamics such a utopia would require.</p

    A Survey of Trust in Internet Applications

    No full text
    Trust is an important aspect of decision making for Intemet applications and particularly influences the specification of security policy i.e. who is authorised to perform actions as well as the techniques needed to manage and implement security to and for the applications. This survey examines the various definitions of trust in the literature and provides a working definition of trust for Intemet applications. The properties of trust relationships are explained and classes of different types of trust identified in the literature are discussed with examples. Some influential examples of trust management systems are described

    A Scalable Trust Management scheme for Mobile Ad Hoc Networks

    Get PDF
    Mobile ad hoc networks MANETs, have special resource requirements and different topology features, they establish themselves on fly without reliance on centralized or specialized entities such as base stations. All the nodes must cooperate with each other in order to send packets, forwarding packets, responding to routing messages, sending recommendations, among others, Cooperating nodes must trust each other. In MANETs, an untrustworthy node can wreak considerable damage and adversely affect the quality and reliability of data. Therefore, analyzing the trust level of a node has a positive influence on the confidence with which an entity conducts transactions with that node. This thesis presents a new trust management scheme to assign trust levels for spaces or nodes in ad hoc networks. The scheme emulates the human model which depends on the previous individual experience and on the intercession or recommendation of other spaces in the same radio range. The trust level considers the recommendation of trustworthy neighbors and their own experience. For the recommendation computation, we take into account not only the trust level, but also its accuracy and the relationship maturity. The relationship rationality -maturity-, allows nodes to improve the efficiency of the proposed model for mobile scenarios. We also introduce the Contribution Exchange Protocol (CEP) which allows nodes to exchange Intercessions and recommendation about their neighbors without disseminating the trust information over the entire network. Instead, nodes only need to keep and exchange trust information about nodes within the radio range. Without the need for a global trust knowledge. Different from most related works, this scheme improves scalability by restricting nodes to keep and exchange trust information solely with direct neighbors, that is, neighbors within the radio range. We have developed a simulator, which is specifically designed for this model, in order to evaluate and identify the main characteristics of the proposed system. Simulation results show the correctness of this model in a single-hop network. Extending the analysis to mobile multihop networks, shows the benefits of the maturity relationship concept, i.e. for how long nodes know each other, the maturity parameter can decrease the trust level error up to 50%. The results show the effectiveness of the system and the influence of main parameters in the presence of mobility. At last, we analyze the performance of the CEP protocol and show its scalability. We show that this implementation of CEP can significantly reduce the number messages

    Trust management for mobile computing platforms

    Get PDF
    Providing a trustworthy mobile computing platform is crucial for mobile communications, services and applications. In this dissertation, we study methodologies and mechanisms that can be used to provide a trustworthy mobile computing platform. We also present an autonomic trust management solution for a component software middleware platform targeting at an embedded device, such as a mobile phone. In the first part of the dissertation, we firstly overview the literature background of trust modeling and trust management. We propose research methodologies on the basis of a conceptual architecture of a trusted mobile environment. Further, we present a methodology to bridge disjoint trusted domains in mobile computing and communications into a trustworthy system. The second part of the dissertation contains a mechanism to sustain trust among computing platforms. The mechanism builds up a trust relationship based on the Root Trust (RT) module at a trustee platform and ensures trust sustainability according to pre-defined conditions. These conditions are approved at the time of trust establishment and enforced through the use of the pre-attested RT module until the intended purpose is fulfilled. Through applying this mechanism, we introduce a Trusted Collaboration Infrastructure (TCI) for peer-to-peer devices in order to establish trust collaboration among distributed peers. In addition, this mechanism contributes to a mobile Virtual Private Network (VPN) for trusted mobile enterprise networking. The third part of the dissertation presents an autonomic trust management solution that can manage trust adaptively in a middleware component software platform. We develop a formal trust model to specify, evaluate, set up and ensure trust relationships that exist among system entities. We further present a trust management architecture that supports the implementation of the above model and adopts a number of algorithms for autonomic trust management at system runtime. In particular, special control modes can be applied into the platform to ensure trustworthiness. We develop a methodology for trust control mode prediction and selection on the basis of an adaptive trust control model in order to support autonomic trust management.reviewe
    corecore