Academic literature on the topic 'Trustworthy service management'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trustworthy service management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trustworthy service management"

1

Luo, Zongwei, and Tianle Zhang. "A Mobile Service Platform for Trustworthy E-Learning Service Provisioning." International Journal of Dependable and Trustworthy Information Systems 1, no. 3 (July 2010): 1–13. http://dx.doi.org/10.4018/jdtis.2010070101.

Full text
Abstract:
Distant e-learning emerges as one of promising means for people to learn online. Although there is a substantial increase in computer and network performance in recent years, mainly as a result of faster hardware and more sophisticated software, there are still problems in the fields of integrating various resources towards enabling distant e-learning. Further, with the advances of technologies in RFID, sensors, GPS, GPRS, IP networks, and wireless networks, mobile learning is becoming a viable means for teaching and learning. In this book chapter, we develop a service platform for mobile learning with trustworthy service provisioning based on an organic integration of our prior research results in service grid, on demand e-learning, and trusted mobile asset tracking. In this platform, the virtual learning services for students, instructors and course providers are provided leveraging on service grid resource management capabilities on group collaboration, ubiquitous data access, and computing power. Challenges and requirements for mobile learning service platform are discussed. An RFID based e-learning data integration is proposed with integrated service networks for intelligent e-learning information access and delivery.
APA, Harvard, Vancouver, ISO, and other styles
2

Farahbakhsh, Bahareh, Ali Fanian, and Mohammad Hossein Manshaei. "TGSM: Towards trustworthy group-based service management for social IoT." Internet of Things 13 (March 2021): 100312. http://dx.doi.org/10.1016/j.iot.2020.100312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kurdi, Heba, Bushra Alshayban, Lina Altoaimy, and Shada Alsalamah. "TrustyFeer: A Subjective Logic Trust Model for Smart City Peer-to-Peer Federated Clouds." Wireless Communications and Mobile Computing 2018 (2018): 1–13. http://dx.doi.org/10.1155/2018/1073216.

Full text
Abstract:
Cloud computing plays a major role in smart cities development by facilitating the delivery of various services in an efficient and effective manner. In a Peer-to-Peer (P2P) federated clouds ecosystem, multiple Cloud Service Providers (CSPs) collaborate and share services among them when experiencing a shortage in certain resources. Hence, incoming service requests to this specific resource can be delegated to other members. Nevertheless, the lack of preexisting trust relationship among CSPs in this distributed environment can affect the quality of service (QoS). Therefore, a trust management system is required to assist trustworthy peers in seeking reliable communication partners. We address this challenge by proposing TrustyFeer, a trust management system that allows peers to evaluate the trustworthiness of other peers based on subjective logic opinions, formulated using peers’ reputations and Service Level Agreements (SLAs). To demonstrate the utility of TrustyFeer, we evaluate the performance of our method against two long-standing trust management systems. The simulation results show that TrustyFeer is more robust in decreasing the percentage of services that do not conform to SLAs and increasing the success rate of exchanged services by good CSPs conforming to SLAs. This should provide a trustworthy federated clouds ecosystem for a better, more sustainable future.
APA, Harvard, Vancouver, ISO, and other styles
4

Perepelkin, Jason, and David Di Zhang. "Quality alone is not enough to be trustworthy." International Journal of Pharmaceutical and Healthcare Marketing 8, no. 2 (May 27, 2014): 226–42. http://dx.doi.org/10.1108/ijphm-02-2013-0006.

Full text
Abstract:
Purpose – The aim of this paper is to argue that quality alone is not enough; pharmacies need to develop a rapport with their customers and convey sincerity. Community (retail) pharmacy is an increasingly competitive industry. Service quality has been considered one of the key factors for pharmacies to differentiate and develop competitive advantage. The customers’ perception of the sincerity of the pharmacies mediates the relationship between quality and trust. Design/methodology/approach – Through consumer intercept, we collected survey data from 150 customers in a western Canadian city who had filled a prescription at the pharmacy in the previous six months. Data were analyzed using structure equation modeling. Findings – Our data revealed that while overall service quality has a positive influence on customer trust, perception of sincerity has a more immediate impact. The relationship between quality and trust was completely mediated through sincerity perception. Originality/value – Service quality has been introduced to pharmacy management and produced many good results. However, the measurement of service quality has historically emphasized on physical evidence. The element of human interaction and subjective affective perceptions has been largely ignored because it is difficult to measure, hence difficult to reward and implement. Our study highlights the importance of personal interactions in the context of pharmacy quality management.
APA, Harvard, Vancouver, ISO, and other styles
5

Moustafa, Ahmed, Minjie Zhang, and Quan Bai. "Trustworthy Stigmergic Service Compositionand Adaptation in Decentralized Environments." IEEE Transactions on Services Computing 9, no. 2 (March 2016): 317–29. http://dx.doi.org/10.1109/tsc.2014.2298873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bhatia, Sugandh, and Jyoteesh Malhotra. "CSPCR: Cloud Security, Privacy and Compliance Readiness - A Trustworthy Framework." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (October 1, 2018): 3756. http://dx.doi.org/10.11591/ijece.v8i5.pp3756-3766.

Full text
Abstract:
The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.
APA, Harvard, Vancouver, ISO, and other styles
7

HWANG, JUNSEOK, SO YOUNG KIM, HAK-JIN KIM, and JIHYOUN PARK. "AN OPTIMAL TRUST MANAGEMENT METHOD TO PROTECT PRIVACY AND STRENGTHEN OBJECTIVITY IN UTILITY COMPUTING SERVICES." International Journal of Information Technology & Decision Making 10, no. 02 (March 2011): 287–308. http://dx.doi.org/10.1142/s0219622011004336.

Full text
Abstract:
Utility computing services constitute business opportunities in the customer-to-customer (C2C) marketplace. Providers deal with the risks and uncertainties faced by users while transacting with unfamiliar counterparts. Ensuring trustworthy transactions among unfamiliar users is an important condition of utility-computing service. Many peer-to-peer (P2P) sites utilize reputation systems; however, such systems are subject to lack of reviewer objectivity and robustness against attacks as well as unfair ratings. In this study, we propose the manual adjustment of reputation ratings by means of transaction monitoring and establish that the resulting enhanced objectivity and robustness in utility-computing service transactions will strengthen the trust management system. We also propose the optimal level of monitoring and penalizing activities based on the level of privacy concerns among users and the appropriate complementary service.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdullah, Lamya, and Juan Quintero. "Sealed computation: a mechanism to support privacy-aware trustworthy cloud service." Information & Computer Security 27, no. 5 (November 11, 2019): 601–20. http://dx.doi.org/10.1108/ics-11-2018-0133.

Full text
Abstract:
Purpose The purpose of this study is to propose an approach to avoid having to trust a single entity in cloud-based applications. In cloud computing, data processing is delegated to a remote party for efficiency and flexibility reasons. A practical user requirement usually is data privacy; hence, the confidentiality and integrity of data processing needs to be protected. In the common scenarios of cloud computing today, this can only be achieved by assuming that the remote party does not in any form act maliciously. Design/methodology/approach An approach that avoids having to trust a single entity is proposed. This approach is based on two concepts: the technical abstraction of sealed computation, i.e. a technical mechanism to confine a privacy-aware processing of data within a tamper-proof hardware container, and the role of an auditing party that itself cannot add functionality to the system but is able to check whether the system (including the mechanism for sealed computation) works as expected. Findings Discussion and analysis of the abstract, technical and procedural requirements of these concepts and how they can be applied in practice are explained. Originality/value A preliminary version of this paper was published in the proceedings of the second International Workshop on SECurity and Privacy Requirements Engineering (SECPRE, 2018).
APA, Harvard, Vancouver, ISO, and other styles
9

Robles, Tomás, Borja Bordel, Ramón Alcarria, and Diego Sánchez-de-Rivera. "Enabling trustworthy personal data protection in eHealth and well-being services through privacy-by-design." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091211. http://dx.doi.org/10.1177/1550147720912110.

Full text
Abstract:
Users are each day more aware of their privacy and data protection. Although this problem is transversal to every digital service, it is especially relevant when critical and personal information is managed, as in eHealth and well-being services. During the last years, many different innovative services in this area have been proposed. However, data management challenges are still in need of a solution. In general, data are directly sent to services but no trustworthy instruments to recover these data or remove them from services are available. In this scheme, services become the users’ data owners although users keep the rights to access, modify, and be forgotten. Nevertheless, the adequate implementation of these rights is not guaranteed, as services use the received data with commercial purposes. In order to address and solve this situation, we propose a new trustworthy personal data protection mechanism for well-being services, based on privacy-by-design technologies. This new mechanism is based on Blockchain networks and indirection functions and tokens. Blockchain networks execute transparent smart contracts, where users’ rights are codified, and store the users’ personal data which are never sent or given to external services. Besides, permissions and privacy restrictions designed by users to be applied to their data and services consuming them are also implemented in these smart contracts. Finally, an experimental validation is also described to evaluate the Quality of Experience (in terms of user satisfaction) and Quality of Service (in terms of processing delay) compared to traditional service provision solutions.
APA, Harvard, Vancouver, ISO, and other styles
10

Alam, Masoom, Mohammad Nauman, Xinwen Zhang, Tamleek Ali, Patrick C. K. Hung, and Quratulain Alam. "Behavioral Attestation for Web Services Based Business Processes." International Journal of Web Services Research 7, no. 3 (July 2010): 52–72. http://dx.doi.org/10.4018/jwsr.2010070103.

Full text
Abstract:
Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for such inter-organizational workflows is the establishment of trustworthiness, which is mostly achieved through non-technical measures, such as legislation, and/or social consent that businesses or organizations pledge themselves to adhere. A business process can only be trustworthy if the behavior of all services in it is trustworthy. Trusted Computing Group (TCG) has defined an open set of specifications for the establishment of trustworthiness through a hardware root-of-trust. This paper has three objectives: firstly, the behavior of individual services in a business process is formally specified. Secondly, to overcome the inherent weaknesses of trust management through software alone, a hardware root of-trust devised by the TCG, is used for the measurement of the behavior of individual services in a business process. Finally, a verification mechanism is detailed through which the trustworthiness of a business process can be verified.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Trustworthy service management"

1

Dalpiaz, Fabiano, Achim Brucker, Paolo Giorgini, Per Håkon Meland, and Erkuden Rios. Secure and Trustworthy Service Composition: The Aniketos Approach. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dalpiaz, Fabiano, Achim Brucker, Paolo Giorgini, Per Håkon Meland, and Erkuden Rios. Secure and Trustworthy Service Composition: The Aniketos Approach. Springer London, Limited, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Leontyeva, Anna A., and Ksenia V. Melchakova, eds. A Stranger’s Gaze: Diplomats, Journalists, Scholars — Travellers between East and West from the Eighteenth Century to the Twenty-First. Institute of Slavic Studies, Russian Academy of Sciences; Nestor-Istoriia, 2020. http://dx.doi.org/10.31168/4469-1767-9.

Full text
Abstract:
This collective monograph deals with the evolution of, and growing complexity in, the collection and analysis of information about the peoples and countries of East and West from the dawn of modernity to the present day. Chapters of the monograph reconstruct the biographies and careers of the main actors involved in cross-cultural dialog, such as diplomats, journalists, and scholars, who contributed to the accumulation of knowledge about political systems, methods of economic management, warfare, and the cultural achievements of the peoples of East and West. Furthermore, it explores the contribution of diplomatic and consular services to the collection, accumulation, and scrutiny of information regarding natural conditions, economics, population, social and political systems, and culture. Special attention is paid to the impact of journalism on public opinion and the spread of trustworthy and unreliable information.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trustworthy service management"

1

Yuan, Yuyu, Yangyang Zhang, and Jing Liu. "Service Behavior Trustworthiness Management." In Trustworthy Computing and Services, 20–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Miandrilala and YuYu Yuan. "Concept of Service Trustworthiness Management System (STMS)." In Trustworthy Computing and Services, 374–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Paul, Stéphane, Alessandra Tedeschi, Erlend Andreas Gjære, and Ivonne Herrera. "The Aniketos Design-Time Framework Applied – A Case in Air Traffic Management." In Secure and Trustworthy Service Composition, 203–18. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13518-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maciaszek, Leszek A. "An Architectural Style for Trustworthy Adaptive Service Based Applications." In Business System Management and Engineering, 109–21. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32439-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Steimers, André, and Thomas Bömer. "Sources of Risk and Design Principles of Trustworthy Artificial Intelligence." In Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. AI, Product and Service, 239–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77820-0_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Linghan, Yonghua Li, Jiaru Lin, and Tianle Zhang. "Enhanced AllJoyn Network with Centralized Management." In Trustworthy Computing and Services, 183–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47401-3_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qiu, Shaolin, Laibin Zhang, Yuanqiang Huang, and Yaming Mao. "An Effective Resource Management Architecture in HSE System." In Trustworthy Computing and Services, 260–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gao, Yuan, Yaoxue Zhang, and Yuezhi Zhou. "A Cache Management Strategy for Transparent Computing Storage System." In Trustworthy Computing and Services, 651–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35795-4_82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xie, Xiaowei, Yu Yang, and Yueming Lu. "A Zones-Based Metadata Management Method for Distributed File System." In Trustworthy Computing and Services, 169–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43908-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wong, Andrew, Vicky Liu, William Caelli, and Tony Sahama. "An Architecture for Trustworthy Open Data Services." In Trust Management IX, 149–62. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18491-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trustworthy service management"

1

Zao, J. K., K. T. Nguyen, Y. H. Wang, A. C. H. Lin, B. W. Wang, and J. W. S. Liu. "Trustworthy emergency information brokerage service (TIBS)." In DISASTER MANAGEMENT 2013. Southampton, UK: WIT Press, 2013. http://dx.doi.org/10.2495/dman130221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhao, Shenghui, Guoxin Wu, Yuemin Li, and Kun Yu. "A Framework for Trustworthy Web Service Management." In 2009 Second International Symposium on Electronic Commerce and Security. IEEE, 2009. http://dx.doi.org/10.1109/isecs.2009.226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tao, Qian, Huiyou Chang, Yang Yi, and Chunqin Gu. "A trustworthy management approach for cloud services QoS data." In 2010 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2010. http://dx.doi.org/10.1109/icmlc.2010.5580998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Myungjin, Kyungmin Kim, Sharly Joana Halder, and Wooju Kim. "Framework of Semantic Web Services for Ubiquitous City Management Center." In 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, 2010. http://dx.doi.org/10.1109/sutc.2010.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"DESIGN AND MAINTENANCE OF TRUSTWORTHY E-SERVICES: INTRODUCING A TRUST MANAGEMENT CYCLE." In 2nd International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2006. http://dx.doi.org/10.5220/0001256001000105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Agbaji, Armstrong Lee. "An Empirical Analysis of Artificial Intelligence, Big Data and Analytics Applications in Exploration and Production Operations." In International Petroleum Technology Conference. IPTC, 2021. http://dx.doi.org/10.2523/iptc-21312-ms.

Full text
Abstract:
Abstract Oil and Gas operations are now being "datafied." Datafication in the oil industry refers to systematically extracting data from the various oilfield activities that are naturally occurring. Successful digital transformation hinges critically on an organization's ability to extract value from data. Extracting and analyzing data is getting harder as the volume, variety, and velocity of data continues to increase. Analytics can help us make better decisions, only if we can trust the integrity of the data going into the system. As digital technology continues to play a pivotal role in the oil industry, the role of reliable data and analytics has never been more consequential. This paper is an empirical analysis of how Artificial Intelligence (AI), big data and analytics has redefined oil and gas operations. It takes a deep dive into various AI and analytics technologies reshaping the industry, specifically as it relates to exploration and production operations, as well as other sectors of the industry. Several illustrative examples of transformative technologies reshaping the oil and gas value chain along with their innovative applications in real-time decision making are highlighted. It also describes the significant challenges that AI presents in the oil industry including algorithmic bias, cybersecurity, and trust. With digital transformation poised to re-invent the oil & gas industry, the paper also discusses energy transition, and makes some bold predictions about the oil industry of the future and the role of AI in that future. Big data lays the foundation for the broad adoption and application of artificial intelligence. Analytics and AI are going to be very powerful tools for making predictions with a precision that was previously impossible. Analysis of some of the AI and analytics tools studied shows that there is a huge gap between the people who use the data and the metadata. AI is as good as the ecosystem that supports it. Trusting AI and feeling confident with its decisions starts with trustworthy data. The data needs to be clean, accurate, devoid of bias, and protected. As the relationship between man and machine continues to evolve, and organizations continue to rely on data analytics to provide decision support services, it is imperative that we safeguard against making important technical and management decisions based on invalid or biased data and algorithm. The variegated outcomes observed from some of the AI and analytics tools studied in this research shows that, when it comes to adopting AI and analytics, the worm remains buried in the apple.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography