122 research outputs found

    Trust and Reputation for Successful Software Self-Organisation

    Get PDF
    Abstract An increasing number of dynamic software evolution approaches is com- monly based on integrating or utilising new pieces of software. This requires reso- lution of issues such as ensuring awareness of newly available software pieces and selection of most appropriate software pieces to use. Other chapters in this book dis- cuss dynamic software evolution focusing primarily on awareness, integration and utilisation of new software pieces, paying less attention on how selection among different software pieces is made. The selection issue is quite important since in the increasingly dynamic software world quite a few new software pieces occur over time, some of which being of lower utility, lower quality or even potentially harmful and malicious (for example, a new piece of software may contain hidden spyware or it may be a virus). In this chapter, we describe how computational trust and reputation can be used to avoid choosing new pieces of software that may be malicious or of lower quality. We start by describing computational models of trust and reputation and subsequently we apply them in two application domains. Firstly, in quality assessment of open source software, discussing the case where different trustors have different understandings of trust and trust estimation methods. Sec- ondly, in protection of open collaborative software, such as Wikipedia

    Case study: Legal Requirements for the Use of Social Login Features for Online Reputation Updates

    Get PDF
    ABSTRACT Online users use more and more social login on third-party sites or applications. To use an existing account to login is faster than to fill in personal information forms over and over again. However, many online users, even those who frequently use social login systems, are not aware of the policies and conditions they agree with. They are often unaware of the consequences of their authentications to access websites and applications, and thus of the information that can be retrieved from their social networks. In this paper, we provide a case-study of the legal requirements that must be observed when social login features are used for authentication in a mobile application in the workplace. The legal requirements considered in this case-study follow from the Belgian implementation of the EU legal framework on privacy and data protection. Particularly interesting for this study is the storage of the data following from external social network profiles; the retention of the retrieved information processed to compute an extra layer of reputation; and the policies accompanying the social login features

    P2P with JXTA-Java pipes

    No full text
    The peer-to-peer (p2p) paradigm is attracting increasing attention from both the research community and software engineers, due to potential performance, reliability and scalability improvements. This paper emphasizes that JXTA can help teachers to teach p2p with Java. This paper also presents an approach for performance analysis of JXTA pipes - one of the key abstractions in JXTA, which has not yet been fully evaluated. It explains how to assess a pipe and demonstrates performance results of the JXTA-Java implementation. In doing so, this paper assists software developers in estimating the overall performance and scalability of JXTA, and the suitability of choosing JXTA for their specific application

    CalvinIA, Territorial AI, et autres technologies impactant le tourisme à Genève

    No full text
    Cette présentation fait un tour d'horizon des technologies numériques qui vont impacter le tourisme à Genève jusqu'en 2030. Le développement d'une intelligence artificielle (AI) territoriale, appelée CalvinIA, nourrie d'une marketplace touristique sur blockchain partagée entre tous les acteurs de Genève est proposée afin d'augmenter les revenus touristiques pour le territoire de Genève

    OSS Quality Assessment Trustworthiness: working paper

    No full text
    Open Source Software (OSS) projects have the unique opportunity to reach an unprecedented level of software quality by tapping into its community and collabortive power. However, the community process of collaborative software Quality Assessment (QA) may not reach its full potential or worse be easily jeopardised by malevolent entities because there is a lack of protection mechanisms, easy-to-use enabling mechanisms and clear incentives. We propose such mechanisms as part of a decentralised collaborative test and QA framework centred on the OSS actors

    Wi-Trust : Computational Trust and Reputation Management for Stronger Hotspot 2.0 Security

    No full text
    In its list of top ten smartphone risks, the European Union Agency for Network and Information Security ranks network spoofing attacks as number 6. In this paper, we present how we have validated different computational trust and reputation management techniques by means of implemented prototypes in real devices to mitigate malicious legacy Wi-Fi hotspots including spoofing attacks. Then we explain how some of these techniques could be more easily deployed on a large scale thanks to simply using the available extensions of Hotspot 2.0, which could potentially lead to a new standard to improve Wi-Fi networks trustworthiness

    Towards Geneva Crypto-Friendly Smart Tourism

    No full text
    A vision for the future of tourism in Geneva region in around 2030, also known as "Geneva 2030, smart city, smart canton", where crypto-currencies would be accepted as part of smart tourism
    • …
    corecore