Results 11 - 20
of
930
DEVELOPING SECURITY METRICS FOR INFORMATION SECURITY MEASUREMENT SYSTEM
"... This paper covers the basic aspects of security metrics. It provides a definition of security metrics explains their value, discusses various aspects or issues in developing the security metrics and design considerations for information security measurement systems. More than 100 years ago, Lord Kel ..."
Abstract
- Add to MetaCart
This paper covers the basic aspects of security metrics. It provides a definition of security metrics explains their value, discusses various aspects or issues in developing the security metrics and design considerations for information security measurement systems. More than 100 years ago, Lord
Directions in Security Metrics Research
, 2009
"... Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and produc ..."
Abstract
- Add to MetaCart
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development
Towards Incentive-Compatible Reputation Management
- In Proceedings of the AAMAS 2002 Workshop on Deception, Fraud and Trust in Agent Societies
, 2003
"... Traditional centralized approaches to security are difficult to apply to large, distributed, multi-agent systems. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many MAS applications. However, designing a reliable ..."
Abstract
-
Cited by 20 (0 self)
- Add to MetaCart
Traditional centralized approaches to security are difficult to apply to large, distributed, multi-agent systems. Developing a notion of trust that is based on the reputation of agents can provide a softer notion of security that is sufficient for many MAS applications. However, designing a
A Taxonomy of Metrics for Hosted Databases
"... Abstract The past three years has seen exponential growth in the number of organizations who have elected to entrust core information technology functions to application service providers. Of particular interest is the outsourcing of critical systems such as corporate databases. Major banks and fin ..."
Abstract
- Add to MetaCart
of software suites has been developed to measure the quality of service the database is providing. This article investigates the performance metrics which have evolved to satisfy this need and describes a taxonomy of performance metrics for hosted databases.
IP/Secure: Providing Security on Datagram Delivery for Mobile Host Environment
- In Proc. of INET'94/JENC 5
, 1994
"... Security issues has long been an area that the Internet has paid least attention to. There were both historical and technical reasons which justified this action, but we are just about to see these justifications to evaporate, as mechanisms for supporting mobile hosts in the Internet are beginning t ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Security issues has long been an area that the Internet has paid least attention to. There were both historical and technical reasons which justified this action, but we are just about to see these justifications to evaporate, as mechanisms for supporting mobile hosts in the Internet are beginning
A User-Centric Study Of Reputation Metrics in Online Communities
"... Abstract. With the growing importance of online markets and communities, users increasingly have to interact with unknown people. When choosing their interaction partners, they often lack direct experience and are forced to rely on ratings provided by others who are often unknown themselves. A numbe ..."
Abstract
- Add to MetaCart
number of reputation systems have been developed with the aim of improving the credibility of inferred reputation values. Most of these reputation systems proved their accuracy and robustness against manipulation in evaluations and therefore are believed to enhance the users trust in the system. However
Managing Trust and Reputation in the
- In Proceedings of the 1st International Conference on Trust Management
, 2003
"... Participants in public distributed computing do not find it easy to trust each other. The massive number of parties involved, their heterogeneous backgrounds, disparate goals and independent nature are not a good basis for the development of relationships through purely social mechanisms. This p ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
Participants in public distributed computing do not find it easy to trust each other. The massive number of parties involved, their heterogeneous backgrounds, disparate goals and independent nature are not a good basis for the development of relationships through purely social mechanisms
Transactions with Fuzzy Reputation Aggregation
"... Internet commerce and online commodity exchanges suffer from distrust among sellers and buyers, who are often strangers to each other. The authors present a new P2P reputation system based on fuzzy logic inferences, which can better handle uncertainty, fuzziness, and incomplete information in peer t ..."
Abstract
- Add to MetaCart
have an effective reputation system to help users locate trustworthy partners and exchange commodities securely with confidence. A reputation system’s effectiveness depends on the trust model adapted. Most existing trust models are developed for general-purpose P2P applications that emphasize
Providing Data Security in WLAN
"... Currently many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet enabling the flexible workforce. While doing so, communications with the Internet is continuously maintained. owever the wireless security is always a primary concern. So for securing dat ..."
Abstract
- Add to MetaCart
Currently many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet enabling the flexible workforce. While doing so, communications with the Internet is continuously maintained. owever the wireless security is always a primary concern. So for securing
Uncheatable reputation for distributed computation markets
- In Financial Cryptography and Data Security Conference (FC ’06
, 2006
"... Abstract. Reputation systems aggregate mutual feedback of interacting peers into a “reputation ” metric for each participant. This is then available to prospective service “requesters ” (clients) for the purpose of evaluation and subsequent selection of potential service “providers ” (servers). For ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
Abstract. Reputation systems aggregate mutual feedback of interacting peers into a “reputation ” metric for each participant. This is then available to prospective service “requesters ” (clients) for the purpose of evaluation and subsequent selection of potential service “providers ” (servers
Results 11 - 20
of
930