Behrouz Tork Ladani

[ 1 ] - GGRA: a grouped gossip-based reputation aggregation algorithm

An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...

[ 2 ] - GTrust: a group based trust model

Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...

[ 3 ] - A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

[ 4 ] - وارسی استحکام سامانه‌های اعتماد

اعتماد و شهرت، مفاهیمی شناخته‌شده در علوم اجتماعی هستند که امروزه در قالب سامانه‌های اعتماد، کاربردهای روزافزونی در علوم رایانه و ارتباطات پیدا کرده‌‌اند. این سامانه‌ها با ارائۀ مدلی محاسباتی و بر پایه مجموعه‌ای از تجربیات و توصیه‌ها، مقادیر اعتماد (یا شهرت که نوع خاصی از اعتماد است) را محاسبه می‌‌کنند. این مقادیر به موجودیت‌ها در شناسایی و سپس منزوی ساختن موجودیت‌های غیردرست‌کار جامعه یاری می‌...

[ 5 ] - Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

[ 6 ] - Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

[ 7 ] - فراتحلیل تاثیر کاربرد فناوری اطلاعات و ارتباطات بر عملکرد آموزشی و پژوهشی اعضای هیات علمی دانشگاه‌ها

هدف پژوهش حاضر فراتحلیل پژوهش‌های انجام شده در زمینه تأثیر استفاده از فناوری اطلاعات و ارتباطات بر عملکرد آموزشی و پژوهشی اساتید، جهت برآورد اندازه اثر واقعی فناوری اطلاعات و ارتباطات بر عملکرد آموزشی و پژوهشی اساتید بود. کلیه پژوهش‌های انجام شده، تا پایان سال 1396 در زمینه رابطه‌ی میزان استفاده از فناوری اطلاعات با عملکرد آموزشی و پژوهشی اعضای هیأت علمی در ایران جامعه پژوهشی می‌باشد. ابزار پژو...