• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 930
Next 10 →

DEVELOPING SECURITY METRICS FOR INFORMATION SECURITY MEASUREMENT SYSTEM

by Ms. Deepti, Juneja Ms, Kavita Arora, Ms. Sonia Duggal
"... This paper covers the basic aspects of security metrics. It provides a definition of security metrics explains their value, discusses various aspects or issues in developing the security metrics and design considerations for information security measurement systems. More than 100 years ago, Lord Kel ..."
Abstract - Add to MetaCart
This paper covers the basic aspects of security metrics. It provides a definition of security metrics explains their value, discusses various aspects or issues in developing the security metrics and design considerations for information security measurement systems. More than 100 years ago, Lord

Directions in Security Metrics Research

by Wayne Jansen Nistir, Wayne Jansen, Patrick D. Gallagher, Deputy Director , 2009
"... Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and produc ..."
Abstract - Add to MetaCart
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development

Towards Incentive-Compatible Reputation Management

by Radu Jurca, Boi Faltings - In Proceedings of the AAMAS 2002 Workshop on Deception, Fraud and Trust in Agent Societies , 2003
"... Traditional centralized approaches to security are difficult to apply to large, distributed, multi-agent systems. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many MAS applications. However, designing a reliable ..."
Abstract - Cited by 20 (0 self) - Add to MetaCart
Traditional centralized approaches to security are difficult to apply to large, distributed, multi-agent systems. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many MAS applications. However, designing a

A Taxonomy of Metrics for Hosted Databases

by Jordan Shropshire , Jordan Shropshire
"... Abstract The past three years has seen exponential growth in the number of organizations who have elected to entrust core information technology functions to application service providers. Of particular interest is the outsourcing of critical systems such as corporate databases. Major banks and fin ..."
Abstract - Add to MetaCart
of software suites has been developed to measure the quality of service the database is providing. This article investigates the performance metrics which have evolved to satisfy this need and describes a taxonomy of performance metrics for hosted databases.

IP/Secure: Providing Security on Datagram Delivery for Mobile Host Environment

by Takeshi Tanida, Yoichi Shinoda - In Proc. of INET'94/JENC 5 , 1994
"... Security issues has long been an area that the Internet has paid least attention to. There were both historical and technical reasons which justified this action, but we are just about to see these justifications to evaporate, as mechanisms for supporting mobile hosts in the Internet are beginning t ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Security issues has long been an area that the Internet has paid least attention to. There were both historical and technical reasons which justified this action, but we are just about to see these justifications to evaporate, as mechanisms for supporting mobile hosts in the Internet are beginning

A User-Centric Study Of Reputation Metrics in Online Communities

by Stephan Hammer, Rolf Kiefhaber, Matthias Redlin, Elisabeth Andre, Theo Ungerer
"... Abstract. With the growing importance of online markets and communities, users increasingly have to interact with unknown people. When choosing their interaction partners, they often lack direct experience and are forced to rely on ratings provided by others who are often unknown themselves. A numbe ..."
Abstract - Add to MetaCart
number of reputation systems have been developed with the aim of improving the credibility of inferred reputation values. Most of these reputation systems proved their accuracy and robustness against manipulation in evaluations and therefore are believed to enhance the users trust in the system. However

Managing Trust and Reputation in the

by Boris Dragovic, Steven Hand, Steven H, Tim Harris, Evangelos Kotsovinos, Andrew Twigg - In Proceedings of the 1st International Conference on Trust Management , 2003
"... Participants in public distributed computing do not find it easy to trust each other. The massive number of parties involved, their heterogeneous backgrounds, disparate goals and independent nature are not a good basis for the development of relationships through purely social mechanisms. This p ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
Participants in public distributed computing do not find it easy to trust each other. The massive number of parties involved, their heterogeneous backgrounds, disparate goals and independent nature are not a good basis for the development of relationships through purely social mechanisms

Transactions with Fuzzy Reputation Aggregation

by Shanshan Song, Kai Hwang, Runfang Zhou, Yu-kwong Kwok
"... Internet commerce and online commodity exchanges suffer from distrust among sellers and buyers, who are often strangers to each other. The authors present a new P2P reputation system based on fuzzy logic inferences, which can better handle uncertainty, fuzziness, and incomplete information in peer t ..."
Abstract - Add to MetaCart
have an effective reputation system to help users locate trustworthy partners and exchange commodities securely with confidence. A reputation system’s effectiveness depends on the trust model adapted. Most existing trust models are developed for general-purpose P2P applications that emphasize

Providing Data Security in WLAN

by Sunil Shirsat, Swapnil Sanap
"... Currently many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet enabling the flexible workforce. While doing so, communications with the Internet is continuously maintained. owever the wireless security is always a primary concern. So for securing dat ..."
Abstract - Add to MetaCart
Currently many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet enabling the flexible workforce. While doing so, communications with the Internet is continuously maintained. owever the wireless security is always a primary concern. So for securing

Uncheatable reputation for distributed computation markets

by Bogdan Carbunar, Radu Sion - In Financial Cryptography and Data Security Conference (FC ’06 , 2006
"... Abstract. Reputation systems aggregate mutual feedback of interacting peers into a “reputation ” metric for each participant. This is then available to prospective service “requesters ” (clients) for the purpose of evaluation and subsequent selection of potential service “providers ” (servers). For ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Abstract. Reputation systems aggregate mutual feedback of interacting peers into a “reputation ” metric for each participant. This is then available to prospective service “requesters ” (clients) for the purpose of evaluation and subsequent selection of potential service “providers ” (servers
Next 10 →
Results 11 - 20 of 930
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University