Security and Trust
نویسندگان
چکیده
منابع مشابه
Security and Trust Requirements Engineering
Integrating security concerns throughout the whole software development process is one of today’s challenges in software and requirements engineering research. A challenge that so far has proved difficult to meet. The major difficulty is that providing security does not only require to solve technical problems but also to reason on the organization as a whole. This makes the usage of traditiona...
متن کاملService Levels, Security, and Trust
This chapter covers the scientific background for the Service Level Module of the Unified Service Description Language (USDL). In addition to general service level concepts, we expand on two specific service level fields: security and trust. For that end we first review the state of the art in service level modeling, then we explain the design of the Service Level Module and position it among t...
متن کاملTrust-Based Security Protocols
An agent-based model of interpersonal trust is used to develop information sharing security protocols in the spirit of soft security. We demonstrate that availability information can be balanced against security breaches. Our protocols are simple, malleable, and scalable. Index Terms – Security protocols, soft security, agents
متن کاملTrust Based Security in Manet
Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when communicating with other n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Japan Society for Fuzzy Theory and Intelligent Informatics
سال: 2007
ISSN: 1347-7986,1881-7203
DOI: 10.3156/jsoft.19.3_198