The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WebRTC provides web calling services by enabling communication between browsers in a P2P fashion. To achieve security and enhance user privacy it is essential to define the level of trust between the various entities involved in WebRTC security architecture. The existing P2P trust models are not directly applicable as the characteristics of browser to browser communication are not taken into account...
Trust is becoming an increasingly important issue in large-scale distributed systems. Especially self-managed systems from the Autonomic and Organic Computing domains consisting of several cooperating entities have to rely on an automated estimation how reliable and trustworthy potential cooperation partners are. In this paper, we introduce a novel concept to represent trust among those entities....
Reputation of Web service plays an important role in selecting the best service from massive services. Traditional approaches of measuring Web service reputation are based on all the historical ratings. Although these approaches are effective in the same context environment, they fail in obtaining accurate reputation measurement when users' context is different. In this paper, we propose a context-based...
Service-oriented environments comprise a number of interconnected service providers and service consumers and are filled by vast numbers of services of various functionalities with different qualities. Finding the desirable services among others is a major problem for a typical user, who can optimize its performance by utilizing services with good qualities. This problem is sometimes addressed by...
In many research and business domains, there are efforts to develop systems that aggregate user data gathered by various data sources. This approach involves secondary sharing of user data and potentially benefits the user in terms of improved personalization and better experience. However, concerns regarding privacy arise when sharing user data with unknown third parties. These concerns can be alleviated...
With the fast adoption of Services Computing, even more driven by the emergence of the Cloud, the need to ensure accountability for quality of service (QoS) for servicebased systems/services has reached a critical level. This need has triggered numerous researches in the fields of trust, reputation and provenance. Most of the researches on trust and reputation have focused on their evaluation or computation...
Distributed hash tables (DHTs), such as Chord and Kademlia, offer an efficient means to locate resources in peer-to-peer networks. Unfortunately, malicious nodes on a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using redundant lookup queries. Much greater assurance can be provided; we present Reputation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.