External Object Trust Zone Mapping for Information Clustering

نویسندگان

  • Yanjun Zuo
  • Brajendra Panda
چکیده

In a loosely-coupled system various objects may be imported from different sources and the integrity levels of these objects can vary widely. Like downloaded information from the World Wide Web, these imported objects should be carefully organized and disseminated to different trust zones, which meet the security requirements of different groups of internal applications. Assigning an object to a trust zone is called trust zone mapping, which is essentially a form of information clustering and is designed to guide internal applications when they are using objects from different zones. We developed methods to perform trust zone mapping based on objects’ trust attribute values. The defined threshold selection operators allow internal applications to best express their major security concerns while tolerating unimportant issues to certain degrees. As two major trust attributes, the primary and secondary trust values are explained and we illustrate how to calculate each of them.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis Accruing of Sentinel 2A Image’s Classification Methods Based on Object Base and Pixel Base in Flood Area Zoning of Taleqan River

Flood zonation mapping is one of the priorities for the soil and water management, which Remote Sensing (RS) capabilities are very applicable to this issue. The main objective of this research was study of accuracy of the Object oriented and Pixel based methods for flood zonation mapping in the Taleghan River basin. Therefore, the Sentinel 2A satellite image of the study area classified using s...

متن کامل

Merging Similarity and Trust Based Social Networks to Enhance the Accuracy of Trust-Aware Recommender Systems

In recent years, collaborative filtering (CF) methods are important and widely accepted techniques are available for recommender systems. One of these techniques is user based that produces useful recommendations based on the similarity by the ratings of likeminded users. However, these systems suffer from several inherent shortcomings such as data sparsity and cold start problems. With the dev...

متن کامل

Using a Novel Concept of Potential Pixel Energy for Object Tracking

Abstract   In this paper, we propose a new method for kernel based object tracking which tracks the complete non rigid object. Definition the union image blob and mapping it to a new representation which we named as potential pixels matrix are the main part of tracking algorithm. The union image blob is constructed by expanding the previous object region based on the histogram feature. The pote...

متن کامل

Reputation-Based Clustering Algorithms in Mobile Ad Hoc Networks

Clustering is one of the main techniques that are used to increase the scalability of MANETs, but without any security considerations clustering is prone to various security attacks. Some cryptographic-based schemes have been proposed to secure the clustering process, but they are unable to handle the internal attacks. Trust-based clustering schemes have combined the trust management systems wi...

متن کامل

Recognizing and Discovering Spoofing Attacks for Mobile Adhoc Network

Wireless networks are exposed to many attacks which of one is spoofing attack. The networks performance will be affected more when the attackers are present. We propose to use the spatial correlation of received signal strength (RSS) inherited from wireless nodes to detect the spoofing attacks. K means clustering is used to determine the number of attackers. In this paper we proposed to use Enh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005