The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Provides an abstract for each of the tutorial presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
The past ten years has seen increasing calls to makesecurity research more "scientific".On the surface, most agree that this is desirable, given universal recognition of "science" as a positive force. However, we find that there is little clarity on what "scientific" means inthe context of computer security research, or consensus onwhat a "Science of Security"...
While the domain of big data is anticipated to affect many aspects of human endeavour, there are numerous challenges in building big data applications among which is how to address big data characteristics in quality requirements. In this paper, we propose a novel, unified, approach for specifying big data characteristics (e.g., velocity of data arrival) in quality requirements (i.e., those requirements...
Usability is considered as one of the most important quality factors for commercial Web interfaces, along with others such as performance and security. However, most of usability evaluation methods for these Web applications do not support automatic measures. This paper addresses these issues through the presentation of an automatic evaluation model based on a systematic qualitative technique to validate...
To assist the vulnerability identification process, researchers proposed prediction models that highlight (for inspection) the most likely to be vulnerable parts of a system. In this paper we aim at making a reliable replication and comparison of the main vulnerability prediction models. Thus, we seek for determining their effectiveness, i.e., their ability to distinguish between vulnerable and non-vulnerable...
In the collaborative systems, in order to establish successful and protected collaboration, the trust management is first established between the participating entities and the trust score of each entity is calculated. This score is obtained based on the three trust criteria (satisfaction, reputation and recommendation) that are redefined and reused in our model: Tr-OrBAC. The evaluation of these...
Conformance checking is a crucial challenge for modern inter-organizational business processes when critical security, privacy and workflow constraints must be satisfied to ensure the reliability of multi-party business procedures. Many of these constraints can be expressed in terms of causal dependencies, and verifying such dependencies can be fundamental to determine the correctness of transactions...
Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service...
The rapid growth of Social Commerce (s-commerce) fuels the need for delivering better quality of services. The existence of C2C social commerce on Facebook and other social media networks requires the use of electronic service quality (e-SQ) instruments. The aim of this paper is to apply the existing e-SQ measures to the context of C2C s-commerce in Thailand. A pilot test study was conducted on Facebook...
Deterrence and rational choice calculus theories can regulate or motivate employees' compliance with information systems security policy (ISSP). However, the two well-developed theories may not fully induce compliance behavior of ISSP given the growing trend of IS security violation in China. Deterrence and rational choice calculus employ an assumption of general awareness of ISSP to address compliance...
Using internet of things (IoT) to connect things, service, and people for intelligent operations has been discussed and deployed in many industry domains such as smart city, smart energy, healthcare, food and water tracking, logistics and retail, and transportation. However, scarce information is available for IoT usage in industrial automation domain for reliable and collaborative automation with...
The expected proliferation of massive number of connected devices in the Internet of Things (IoT) context imposes several challenges and constraints to inter & intra IoT communication. Current mechanism has limited capability for handling a number of aspects associated with this exponential rise in connected devices, types and functions of IoT networks, and availability of heterogeneous modes...
The paper is to explore how to satisfy customer-contact employees when they encounter their managers in the Chinese leisure industry. Adopted a qualitative approach, based on a case study of the Chinese golf industry, the research indicates internal service quality is constructed by nine dimensions in the four service situations, and develops a model of internal service quality construct during internal...
Cloud service certifications attempt to assure a high level of security and compliance. However, considering that cloud services are part of an ever-changing environment, multi-year validity periods may put in doubt the reliability of such certifications. We argue that continuous auditing of selected certification criteria is required to assure continuously reliable and secure cloud services and thereby...
Proper knowledge management and advanced semantic reasoning are of pivotal importance in promoting innovation and productivity in a cooperative team and opening new opportunities in commerce, science, and computing applications. To address such a requirements a series of solutions for distributed knowledge management have been proposed over the last decade, among which the most promising is the so-called...
The purpose of this study is to explore Thai online customers' repurchase intention towards clothing. This study integrated Delone and Mclean's e-commerce success model to predict customers' repurchase intention to purchase clothing on the Internet. The data was collected using convenience sampling method with a survey of the customers in Thailand who had experienced purchasing clothing online. The...
Distributed hash tables (DHTs), such as Chord and Kademlia, offer an efficient means to locate resources in peer-to-peer networks. Unfortunately, malicious nodes on a lookup path can easily subvert such queries. Several systems, including Halo (based on Chord) and Kad (based on Kademlia), mitigate such attacks by using redundant lookup queries. Much greater assurance can be provided; we present Reputation...
Software as a Service (SaaS) is a software delivery paradigm in which the product is not installed on-premise, but it is available on Internet and Web. The customers do not pay to possess the software itself but rather to use it. Hence, we see increasing number of organizations adopting SaaS. However, each customer is unique, which leads to a very large variation in the requirements off the software...
While provenance research is common in distributed systems, many proposed solutions do not address the security of systems and accountability of data stored in those systems. In this paper, we survey provenance solutions which were proposed to address the problems of system security and data accountability in distributed systems. From our survey, we derive a set of minimum requirements that are necessary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.