9,614 research outputs found

    Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems

    Get PDF
    In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which is solved by employing random forest regression model. Additionally, as the Fog-CPS systems could be deployed in open and unprotected environments, the CPS devices and fog nodes are vulnerable to numerous attacks namely, collusion, self-promotion, badmouthing, ballot-stuffing, and opportunistic service. The compromised entities can impact the accuracy of trust computation model by increasing/decreasing the trust of other nodes. These challenges are addressed by designing a generic trust credibility model which can countermeasures the compromise of both CPS devices and fog nodes. The credibility of each newly computed trust value is evaluated and subsequently adjusted by correlating it with a standard deviation threshold. The standard deviation is quantified by computing the trust in two configurations of hostile environments and subsequently comparing it with the trust value in a legitimate/normal environment. Our results demonstrate that credibility model successfully countermeasures the malicious behaviour of all Fog-CPS entities i.e. CPS devices and fog nodes. The multi-factor trust assessment and credibility evaluation enable accurate and precise trust computation and guarantee a dependable Fog-CPS system

    Data centric trust evaluation and prediction framework for IOT

    Get PDF
    © 2017 ITU. Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the end entities (entity-centric) relative to the trustor. In these systems, trust level of the data is assumed to be the same as the trust level of the data source. However, most of the IoT based systems are data centric and operate in dynamic environments, which need immediate actions without waiting for a trust report from end entities. We address this challenge by extending our previous proposals on trust establishment for entities based on their reputation, experience and knowledge, to trust estimation of data items [1-3]. First, we present a hybrid trust framework for evaluating both data trust and entity trust, which will be enhanced as a standardization for future data driven society. The modules including data trust metric extraction, data trust aggregation, evaluation and prediction are elaborated inside the proposed framework. Finally, a possible design model is described to implement the proposed ideas

    Web Auctions in Europe

    Get PDF
    This paper argues that a better understanding of the business model of web auctions can be reached if we adopt a broader view and provide empirical research from different sites. In this paper the business model of web auctions is refined into four dimensions. These are auction model, motives, exchange processes, and stakeholders. One of the objects of this research is to redefine the blurry concept of the business model by analyzing one business model, the web auction model. We show in this research the complexity and diversity of factors contributing to the success of the web auction model. By generalizing the results to the level of business model we also show how complex and diverse business models can be. Motivated by the lack of empirically grounded justification for the mixed business results of web auctions, this paper adopts a qualitative approach that includes telephone interviews with web auctions developed in different European countries.exchange processes;stakeholders;Web auctions

    Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

    Full text link
    Smartphones have become the most pervasive devices in people's lives, and are clearly transforming the way we live and perceive technology. Today's smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as accelerometer, gyroscope, microphone, and camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this paper, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the current state-of-the-art on the topic. We also outline novel research challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN

    The Value of User-Visible Internet Cryptography

    Full text link
    Cryptographic mechanisms are used in a wide range of applications, including email clients, web browsers, document and asset management systems, where typical users are not cryptography experts. A number of empirical studies have demonstrated that explicit, user-visible cryptographic mechanisms are not widely used by non-expert users, and as a result arguments have been made that cryptographic mechanisms need to be better hidden or embedded in end-user processes and tools. Other mechanisms, such as HTTPS, have cryptography built-in and only become visible to the user when a dialogue appears due to a (potential) problem. This paper surveys deployed and potential technologies in use, examines the social and legal context of broad classes of users, and from there, assesses the value and issues for those users

    The Relationship between Buyer and a B2B e-Marketplace: Cooperation Determinants in an Electronic Market Context

    Get PDF
    In this article, the authors argue that cooperation may be achieved by adding technology dimensions to the core product. Given the growing importance of real time information exchange and interactivity, a better understanding of the use of technology to the establishment and development of the buyer-supplier cooperative relationships is essential for knowledge advancement. Using a sample of nearly 400 SMEs purchasing managers, this paper reveals that in an electronic market context, cooperation is positively affected by termination costs, supplier policies and practices, communication and information exchange, and negatively affected by product prices and opportunistic behavior. Moreover, both relationship commitment and trust play a major role in mediating the relationships between these five determinants and cooperation.relationship marketing, trust, cooperation, electronic markets, e-commerce

    ITC SOLUTIONS TO ACHIEVE PERFORMANCE AND EFFICIENCY OF HEALTH SERVICES:ONLINE VIRTUAL CLINIC

    Get PDF
    The digital era modified the way people work, how the information and the informational resources are defined and organized. The organization which holds, uses and correctly reproduces the piece of information, the knowledge, the intellectual capital, becomes a leader in the proper field of activity. Following the actual tendencies in the digital era connected to the exchange of professional information, I can say that the exchange and sharing of digital information in a global multitude of interconnected computers are essential instruments that can contribute to the development and consolidation of the intellectual potential of the organization. This is why, the access of the individuals to information is an actual requirement of the development of the Romanian society in the context of globalization and world implication o contemporary processes and phenomena. The Digital integration eliminates the barriers that traditionally suppress the circuit of the medical information, lets the goods and services circulate to and from Romania by promoting efficiency as final purpose. Performance is needed in the health system, the transformation of the system of medical services by bringing the benefits of the medical science and technology to all individuals from every community. In order to accomplish these expectations it is needed that all the components that form the health system look at it as a whole and subscribe to modern solutions for improvement so that the quality of health should raise to an unprecedented level. Even if health systems differ from country to country from the organizational and financial point of view, they face the same challenges and problems, respectively the supply of medical care of better quality and keeping under control the health expenses. The use of information and communication technology in the field of medical assistance in order to stock, share, transmit and analyze clinical data and knowledge is more necessary than ever.Internet, communication in real time, health system, medical information system, digital integration, virtual medical assistance, virtual clinic, shared medical information
    • 

    corecore