Trustworthiness

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 75765 Experts worldwide ranked by ideXlab platform

Wang Lunwei - One of the best experts on this subject based on the ideXlab platform.

  • research on control flags based weighted authentication Trustworthiness model
    Pacific Rim International Symposium on Dependable Computing, 2005
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huaimin
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness model. The model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

  • Access request Trustworthiness in weighted access control framework
    Wuhan University Journal of Natural Sciences, 2005
    Co-Authors: Wang Lunwei, Liao Xiangke, Wang Huai-min
    Abstract:

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a Trustworthiness model for access request is also given. In this model, we give the measure of Trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request Trustworthiness factor among multiple policies, and get the final Trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request Trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  • PRDC - Research on control flags-based weighted authentication Trustworthiness model
    11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), 1
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huai-min
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness model. The model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

Wang Huai-min - One of the best experts on this subject based on the ideXlab platform.

  • Research on the Trustworthiness Sharing Authentication Model
    Computer Engineering and Science, 2005
    Co-Authors: Wang Huai-min
    Abstract:

    Because the authentication systems have several uncertainties, this paper gives the related concepts of Authentication Trustworthiness to describe the uncertainties, and gives the Trustworthiness sharing authentication model under the condition of multiple authentication mechanisms. Based on the thought of Trustworthiness sharing, by decentralizing the management of system access Trustworthiness among multiple authentication me[JP2]chanisms, the model can prevent the authentication mechanism with too many rights, and satisfy the special requirements of important systems, and improve their security.

  • Access request Trustworthiness in weighted access control framework
    Wuhan University Journal of Natural Sciences, 2005
    Co-Authors: Wang Lunwei, Liao Xiangke, Wang Huai-min
    Abstract:

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a Trustworthiness model for access request is also given. In this model, we give the measure of Trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request Trustworthiness factor among multiple policies, and get the final Trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request Trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  • PRDC - Research on control flags-based weighted authentication Trustworthiness model
    11th Pacific Rim International Symposium on Dependable Computing (PRDC'05), 1
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huai-min
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness model. The model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

Bing Xie - One of the best experts on this subject based on the ideXlab platform.

  • arima model based web services Trustworthiness evaluation and prediction
    International Conference on Service Oriented Computing, 2012
    Co-Authors: Zhebang Hua, Junfeng Zhao, Yanzhen Zou, Bing Xie
    Abstract:

    As most Web services are delivered by third parties over unreliable Internet and are late bound at run-time, it is reasonable and useful to evaluate and predict the Trustworthiness of Web services. In this paper, we propose an ARIMA model-based approach to evaluate and predict Web services Trustworthiness. First, we evaluate Web services Trustworthiness with comprehensive trustworthy evidences collected from the Internet on a regular basis. Then, the cumulative Trustworthiness evaluation records are modeled as time series. Finally, we propose an ARIMA model-based multi-step Web services Trustworthiness prediction process, which can automatically and iteratively identify and optimize the model to fit the Trustworthiness series data. Experiments conducted on a large-scale real-world data set show that our method can effectively evaluate and predict the Trustworthiness of Web services, which helps users to reuse Web services.

Wang Huaimin - One of the best experts on this subject based on the ideXlab platform.

  • research on control flags based weighted authentication Trustworthiness model
    Pacific Rim International Symposium on Dependable Computing, 2005
    Co-Authors: Wang Lunwei, He Lianyue, Liao Xiangke, Wang Huaimin
    Abstract:

    In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication Trustworthiness model. The model firstly calculates the Trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication Trustworthiness under multiple authentication rules. By comparing user's authentication Trustworthiness with system access Trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.

Josep Prieto - One of the best experts on this subject based on the ideXlab platform.

  • A methodological approach for Trustworthiness assessment and prediction in mobile online collaborative learning
    Computer Standards & Interfaces, 2016
    Co-Authors: Jorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto, Leonard Barolli
    Abstract:

    Trustworthiness and technological security solutions are closely related to online collaborative learning and they can be combined with the aim of reaching information security requirements for e-Learning participants and designers. Moreover, mobile collaborative learning is an emerging educational model devoted to providing the learner with the ability to assimilate learning any time and anywhere. In this paper, we justify the need of Trustworthiness models as a functional requirement devoted to improving information security. To this end, we propose a methodological approach to modelling Trustworthiness in online collaborative learning. Our proposal sets out to build a theoretical approach with the aim to provide e-Learning designers and managers with guidelines for incorporating security into mobile online collaborative activities through Trustworthiness assessment and prediction. Methodology to modelling Trustworthiness in mobile online collaborative learningGuidelines for incorporating security into mobile online collaborative activitiesProvide Trustworthiness assessment methodsTrustworthiness prediction based on a neuronal network approachEvaluation of Trustworthiness prediction and methodology on real online courses

  • CISIS - Towards a Normalized Trustworthiness Approach to Enhance Security in On-Line Assessment
    2014 Eighth International Conference on Complex Intelligent and Software Intensive Systems, 2014
    Co-Authors: Jorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto, Leonard Barolli
    Abstract:

    This paper proposes an approach to enhance information security in on-line assessment based on a normalized Trustworthiness model. Among collaborative e-Learning drawbacks which are not completely solved, we have investigated information security requirements in on-line assessment (e-assessment). To the best of our knowledge, security requirements cannot be reached with technology alone, therefore, new models such as Trustworthiness approaches can complete technological solutions and support e-assessment requirements for e-Learning. Although Trustworthiness models can be defined and included as a service in e-assessment security frameworks, there are multiple factors related to Trustworthiness which cannot be managed without normalization. Among these factors we discuss Trustworthiness multiple sources, different data source formats, measure techniques and other Trustworthiness factors such as rules, evolution or context. Hence, in this paper, we justify why Trustworthiness normalization is needed and a normalized Trustworthiness model is proposed by reviewing existing normalization procedures for trustworthy values applied to e-assessments. Eventually, we examine the potential of our normalized Trustworthiness model in a real online collaborative learning course.

  • AINA - Security in Online Learning Assessment Towards an Effective Trustworthiness Approach to Support E-Learning Teams
    2014 IEEE 28th International Conference on Advanced Information Networking and Applications, 2014
    Co-Authors: Jorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto
    Abstract:

    This paper proposes a Trustworthiness model for the design of secure learning assessment in on-line collaborative learning groups. Although computer supported collaborative learning has been widely adopted in many educational institutions over the last decade, there exist still drawbacks which limit their potential in collaborative learning activities. Among these limitations, we investigate information security requirements in on-line assessment, (e-assessment), which can be developed in collaborative learning contexts. Despite information security enhancements have been developed in recent years, to the best of our knowledge, integrated and holistic security models have not been completely carried out yet. Even when security advanced methodologies and technologies are deployed in Learning Management Systems, too many types of vulnerabilities still remain opened and unsolved. Therefore, new models such as Trustworthiness approaches can overcome these lacks and support e-assessment requirements for e-Learning. To this end, a Trustworthiness model is designed in order to conduct the guidelines of a holistic security model for on-line collaborative learning through effective Trustworthiness approaches. In addition, since users' Trustworthiness analysis involves large amounts of ill-structured data, a parallel processing paradigm is proposed to build relevant information modeling Trustworthiness levels for e-Learning.

  • INCoS - A Methodological Approach to Modelling Trustworthiness in Online Collaborative Learning
    2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
    Co-Authors: Jorge Miguel, Santi Caballé, Fatos Xhafa, Josep Prieto, Leonard Barolli
    Abstract:

    Trustworthiness and technological security solutions are closely related to online collaborative learning as they can be combined with the aim of reaching information security requirements for e-Learning participants and designers. In this paper, we justify the need of Trustworthiness models as a functional requirement devoted to improve information security. To this end, we propose a methodological approach to modelling Trustworthiness in online collaborative learning. Our proposal sets out to build a theoretical approach with the aim to provide e-Learning designers and managers with guidelines for incorporating security into online collaborative activities through Trustworthiness assessment and prediction.