1,004 research outputs found

    A Fuzzy Approach for Transactional Risk Management in E-Business Collaborations

    Get PDF
    Risk Management is an important process to be carried out for any form of interaction before decision-making. This process will help the concerned user to take steps and actions accordingly in order to address risks and achieve the activity's desired goals. Various techniques and approaches for risk management have been discussed in the literature. But the process of risk management is not generic and it varies and changes according to the domain or purpose of the interaction for which it is being considered. E-business interactions are collaborative interactions that are mostly carried out over a virtual environment. But by considering the growth of e-business interactions, a process of risk management is needed by which the interacting user can actually minimize and lessen the level of risk before decision-making. In this paper, a quantitative approach for risk management in e-business interactions is proposed which the interacting user can utilize to lessen the level of risk and then make an interaction-based decision

    State of the art review of the existing soft computing based approaches to trust and reputation computation

    Get PDF
    In this paper we present a state of the art review of PageRanktrade based approaches for trust and reputation computation. We divide the approaches that make use of PageRanktrade method for trust and reputation computation, into six different classes. Each of the six classes is discussed in this paper

    A robust methodology for prediction of trust and reputation values

    Get PDF
    In this paper, we present the FC direct trust value-based decision making methodology, for making direct trust value based decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot. The direct trust value-based decision making methodology models the context specific nature of trust and the dynamic nature of trust to make direct trust value-based decisions regarding interactions. Additionally in this paper, we present the FC reputation-based trust decision making methodology, for making reputation-based trust decisions regard ing interactions, if direct trust value-based decisions cannot be made. The FC reputationbased trust decision making methodology can make reputationbased trust decisions regarding interactions in (a) a given context and during the current time slot, and (b) a given context and at a future time slot

    Towards multi-criteria cloud service selection

    Get PDF
    Cloud computing despite being in an early stage of adoption is becoming a popular choice for businesses to replace in-house IT infrastructure due to its technological advantages such as elastic computing and cost benefits resulting from pay-as-you-go pricing and economy of scale. These factors have led to a rapid increase in both the number of cloud vendors and services on offer. Given that cloud services could be characterized using multiple criteria (cost, pricing policy, performance etc.) it is important to have a methodology for selecting cloud services based on multiple criteria. Additionally, the end user requirements might map to different criteria of the cloud services. This diversity in services and the number of available options have complicated the process of service and vendor selection for prospective cloud users and there is a need for a comprehensive methodology for cloud service selection. The existing research literature in cloud service selection is mostly concerned with comparison between similar services based on cost or performance benchmarks. In this paper we discuss and formalize the issue of cloud service selection in general and propose a multi-criteria cloud service selection methodology

    A new architecture for dynamic e-business database interoperability

    Get PDF
    There have been many approaches of data sharing in e-businesses, attempting at mapping each field at the source to its corresponding field at the target. These approaches eliminate the need for deriving the global schema and hence eliminate a substantial overhead. But, the approaches work out well only when both the source and the target databases have approximately the same content. Moreover, if some concepts of source do not have the counterpart fields in the target then the mapping will lose the concepts. This problem will be further aggregated by the mapping compositions and the large size of the databases. In this paper, we propose a framework to alleviate the interoperability problem

    Balanced Scorecard-Based Approach to Ascertain the Quality of Education

    Get PDF
    Educational Providers should continually monitor and measure their performance in terms of delivering quality education to the students. Although the importance of such an assessment process has been stressed in the literature, no framework has been proposed that considers all the different relevant factors and determines semantically the level of the quality of education being delivered. In order to provide such an approach, in this paper we propose a framework by which the quality of education being delivered in a subject in an Indonesian university can be determined by using the Balanced Scorecard (BSC). The proposed approach will capture the different factors to be considered from the different perspectives and assimilate them to determine the quality of education. The resultant analysis will provide important inputs to the different stakeholders involved in taking appropriate measures to ensure that students' learning experiences can be maintained at a certain desired level

    Maintaining the integrity of XML signatures by using the manifest element

    Get PDF
    One of the aims of providing 'security of data' in e-commerce transactions is making sure that the receiver receives the same data which the sender sends, that is the data has not been tampered in any way. To achieve this aim digital signatures are used. A digital signature helps in providing integrity, message authentication, and signer authentication for the signed data. An XML signature can contain or point to the data that is being signed. In this paper we discuss a possible solution of avoiding a signature from breaking when there is a change in the location of the document after it has been signed

    Trust-based Throughput in Cognitive Radio Networks

    Get PDF
    Cognitive Radio Networks (CRNs) deal with opportunistic spectrum access in order to fully utilize the scarce of spectrum resources, with the development of cognitive radio technologies to greater utilization of the spectrum. Nowa- days Cognitive Radio (CR) is a promising concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. In this paper, we propose two approaches. At first we propose a trust aware model to authenticate the secondary users (SUs) in CRNs which provides a reliable technique to establish trust for CRNs. Secondly, we propose trust throughput mechanism to measure throughput in CRNs
    • …
    corecore