Добірка наукової літератури з теми "Trust management; cloud service discovery; credibility"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Trust management; cloud service discovery; credibility".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Trust management; cloud service discovery; credibility"

1

Wang, Su Zhen, Liu Wei, and Zhi Juan Du. "A Approach of Credibility-Based Trust Management Service in Cloud Environments." Applied Mechanics and Materials 278-280 (January 2013): 1771–78. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1771.

Повний текст джерела
Анотація:
Trust management is one of the most challenging issues in the emerging cloud computing. A distributed way is adopted to manage and store trust feedbacks data. We propose a credibility-based trust management model that not only distinguishes between credible trust feedbacks, but also has the ability to detect the malicious trust feedbacks from attackers .On this basis, we also present a replication determination model that dynamically decides the optimal replica number of the trust management service so that the trust management service can be always maintained at a desired availability level. The research results have been validated by experimental results.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Lin, Chinho, and Meichun Lin. "The determinants of using cloud supply chain adoption." Industrial Management & Data Systems 119, no. 2 (March 11, 2019): 351–66. http://dx.doi.org/10.1108/imds-12-2017-0589.

Повний текст джерела
Анотація:
Purpose It is necessary to determine the processes affecting cloud computing service applications in supply chain management (SCM) systems in order to facilitate cloud computing service exchanges and transmission of data among supply chain members. The paper aims to discuss these issues. Design/methodology/approach Drawing on the elaboration likelihood model (ELM) and integrating the commitment trust theory, this paper develops a theoretical model using argument advantage and source credibility constructs to examine the relationships among perceived usefulness, attitude, trust and usage intention. Findings The results indicate that both the central route and the peripheral route of the ELM have a positive influence on perceived usefulness. The argument advantage has a strong influence on perceived usefulness as compared to source credibility while source credibility has a strong impact on trust. Furthermore, the perceived usefulness of cloud computing services plays a pivotal role in attitude and intention, whereas trust has a weak effect on usage intention. Originality/value The proposed model not only explores the argument that potential user evaluations of both the advantages of cloud computing services and source credibility influence their affective states, which in turn affect their usage intention, but it also examines the mediating factors that influence processes related to cloud SCM acceptance.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Jaswal, Shivani, and Manisha Malhotra. "MATEM." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijcac.305213.

Повний текст джерела
Анотація:
The paradigms of Cloud Computing have risen at a very rapid rate. The Cloud Computing demands that a trustworthy or reliable service should be availed by its potential user. However, it is always a challenge for any cloud user to look for service that is suitable as well as reliable in every aspect. For a trustworthy discovery and delivery of cloud services, a multi-layered model i.e., Multi Agent based Trust Evaluation Model (MATEM) has been proposed. It is a multi-agent trust model that will make use of multiple agents to perform and evaluate the credibility of trust through trust evaluation system. Also, the performance validation has proven that the final calculated values of trust will be helpful in providing reliable cloud services to its users.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Biran, Yahav, George Collins, Borky John M, and Joel Dubow. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 513-519 (2017); View Description Modelization of cognition, activity and motivation as indicators for Interactive Learning Environment Asmaa Darouich, Faddoul Khoukhi, Khadija Douzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 520-531 (2017); View Description Homemade array of surface coils implementation for small animal magnetic resonance imaging Fernando Yepes-Calderon, Olivier Beuf Adv. Sci. Technol. Eng. Syst. J. 2(3), 532-539 (2017); View Description An Encryption Key for Secure Authentication: The Dynamic Solution Zubayr Khalid, Pritam Paul, Khabbab Zakaria, Himadri Nath Saha Adv. Sci. Technol. Eng. Syst. J. 2(3), 540-544 (2017); View Description Multi-Domain Virtual Network Embedding with Coordinated Link Mapping Shuopeng Li, Mohand Yazid Saidi, Ken Chen Adv. Sci. Technol. Eng. Syst. J. 2(3), 545-552 (2017); View Description Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2017): 553–61. http://dx.doi.org/10.25046/aj020371.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Abdelhedi, Fatma, and Nabil Derbel. "Volume 2, Issue 3, Special issue on Recent Advances in Engineering Systems (Published Papers) Articles Transmit / Received Beamforming for Frequency Diverse Array with Symmetrical frequency offsets Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 1-6 (2017); View Description Detailed Analysis of Amplitude and Slope Diffraction Coefficients for knife-edge structure in S-UTD-CH Model Eray Arik, Mehmet Baris Tabakcioglu Adv. Sci. Technol. Eng. Syst. J. 2(3), 7-11 (2017); View Description Applications of Case Based Organizational Memory Supported by the PAbMM Architecture Martín, María de los Ángeles, Diván, Mario José Adv. Sci. Technol. Eng. Syst. J. 2(3), 12-23 (2017); View Description Low Probability of Interception Beampattern Using Frequency Diverse Array Antenna Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 24-29 (2017); View Description Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching Casimer DeCusatis, Piradon Liengtiraphan, Anthony Sager Adv. Sci. Technol. Eng. Syst. J. 2(3), 30-35 (2017); View Description A Derived Metrics as a Measurement to Support Efficient Requirements Analysis and Release Management Indranil Nath Adv. Sci. Technol. Eng. Syst. J. 2(3), 36-40 (2017); View Description Feedback device of temperature sensation for a myoelectric prosthetic hand Yuki Ueda, Chiharu Ishii Adv. Sci. Technol. Eng. Syst. J. 2(3), 41-40 (2017); View Description Deep venous thrombus characterization: ultrasonography, elastography and scattering operator Thibaud Berthomier, Ali Mansour, Luc Bressollette, Frédéric Le Roy, Dominique Mottier Adv. Sci. Technol. Eng. Syst. J. 2(3), 48-59 (2017); View Description Improving customs’ border control by creating a reference database of cargo inspection X-ray images Selina Kolokytha, Alexander Flisch, Thomas Lüthi, Mathieu Plamondon, Adrian Schwaninger, Wicher Vasser, Diana Hardmeier, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irène Dorion, Najib Gadi, Serge Maitrejean, Abraham Marciano, Andrea Canonica, Eric Rochat, Ger Koomen, Micha Slegt Adv. Sci. Technol. Eng. Syst. J. 2(3), 60-66 (2017); View Description Aviation Navigation with Use of Polarimetric Technologies Arsen Klochan, Ali Al-Ammouri, Viktor Romanenko, Vladimir Tronko Adv. Sci. Technol. Eng. Syst. J. 2(3), 67-72 (2017); View Description Optimization of Multi-standard Transmitter Architecture Using Single-Double Conversion Technique Used for Rescue Operations Riadh Essaadali, Said Aliouane, Chokri Jebali and Ammar Kouki Adv. Sci. Technol. Eng. Syst. J. 2(3), 73-81 (2017); View Description Singular Integral Equations in Electromagnetic Waves Reflection Modeling A. S. Ilinskiy, T. N. Galishnikova Adv. Sci. Technol. Eng. Syst. J. 2(3), 82-87 (2017); View Description Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives. Fabian Bustamante, Walter Fuertes, Paul Diaz, Theofilos Toulqueridis Adv. Sci. Technol. Eng. Syst. J. 2(3), 88-99 (2017); View Description Dependence-Based Segmentation Approach for Detecting Morpheme Boundaries Ahmed Khorsi, Abeer Alsheddi Adv. Sci. Technol. Eng. Syst. J. 2(3), 100-110 (2017); View Description Paper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language Soufiane Farrah, Hanane El Manssouri, Ziyati Elhoussaine, Mohamed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 111-115 (2017); View Description Medical imbalanced data classification Sara Belarouci, Mohammed Amine Chikh Adv. Sci. Technol. Eng. Syst. J. 2(3), 116-124 (2017); View Description ADOxx Modelling Method Conceptualization Environment Nesat Efendioglu, Robert Woitsch, Wilfrid Utz, Damiano Falcioni Adv. Sci. Technol. Eng. Syst. J. 2(3), 125-136 (2017); View Description GPSR+Predict: An Enhancement for GPSR to Make Smart Routing Decision by Anticipating Movement of Vehicles in VANETs Zineb Squalli Houssaini, Imane Zaimi, Mohammed Oumsis, Saïd El Alaoui Ouatik Adv. Sci. Technol. Eng. Syst. J. 2(3), 137-146 (2017); View Description Optimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters Adrian Popovici, Mircea Băbăiţă, Petru Papazian Adv. Sci. Technol. Eng. Syst. J. 2(3), 147-152 (2017); View Description Control design for axial flux permanent magnet synchronous motor which operates above the nominal speed Xuan Minh Tran, Nhu Hien Nguyen, Quoc Tuan Duong Adv. Sci. Technol. Eng. Syst. J. 2(3), 153-159 (2017); View Description A synchronizing second order sliding mode control applied to decentralized time delayed multi−agent robotic systems: Stability Proof Marwa Fathallah, Fatma Abdelhedi, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 160-170 (2017); View Description Fault Diagnosis and Tolerant Control Using Observer Banks Applied to Continuous Stirred Tank Reactor Martin F. Pico, Eduardo J. Adam Adv. Sci. Technol. Eng. Syst. J. 2(3), 171-181 (2017); View Description Development and Validation of a Heat Pump System Model Using Artificial Neural Network Nabil Nassif, Jordan Gooden Adv. Sci. Technol. Eng. Syst. J. 2(3), 182-185 (2017); View Description Assessment of the usefulness and appeal of stigma-stop by psychology students: a serious game designed to reduce the stigma of mental illness Adolfo J. Cangas, Noelia Navarro, Juan J. Ojeda, Diego Cangas, Jose A. Piedra, José Gallego Adv. Sci. Technol. Eng. Syst. J. 2(3), 186-190 (2017); View Description Kinect-Based Moving Human Tracking System with Obstacle Avoidance Abdel Mehsen Ahmad, Zouhair Bazzal, Hiba Al Youssef Adv. Sci. Technol. Eng. Syst. J. 2(3), 191-197 (2017); View Description A security approach based on honeypots: Protecting Online Social network from malicious profiles Fatna Elmendili, Nisrine Maqran, Younes El Bouzekri El Idrissi, Habiba Chaoui Adv. Sci. Technol. Eng. Syst. J. 2(3), 198-204 (2017); View Description Pulse Generator for Ultrasonic Piezoelectric Transducer Arrays Based on a Programmable System-on-Chip (PSoC) Pedro Acevedo, Martín Fuentes, Joel Durán, Mónica Vázquez, Carlos Díaz Adv. Sci. Technol. Eng. Syst. J. 2(3), 205-209 (2017); View Description Enabling Toy Vehicles Interaction With Visible Light Communication (VLC) M. A. Ilyas, M. B. Othman, S. M. Shah, Mas Fawzi Adv. Sci. Technol. Eng. Syst. J. 2(3), 210-216 (2017); View Description Analysis of Fractional-Order 2xn RLC Networks by Transmission Matrices Mahmut Ün, Manolya Ün Adv. Sci. Technol. Eng. Syst. J. 2(3), 217-220 (2017); View Description Fire extinguishing system in large underground garages Ivan Antonov, Rositsa Velichkova, Svetlin Antonov, Kamen Grozdanov, Milka Uzunova, Ikram El Abbassi Adv. Sci. Technol. Eng. Syst. J. 2(3), 221-226 (2017); View Description Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 227-232 (2017); View Description Classifying region of interests from mammograms with breast cancer into BIRADS using Artificial Neural Networks Estefanía D. Avalos-Rivera, Alberto de J. Pastrana-Palma Adv. Sci. Technol. Eng. Syst. J. 2(3), 233-240 (2017); View Description Magnetically Levitated and Guided Systems Florian Puci, Miroslav Husak Adv. Sci. Technol. Eng. Syst. J. 2(3), 241-244 (2017); View Description Energy-Efficient Mobile Sensing in Distributed Multi-Agent Sensor Networks Minh T. Nguyen Adv. Sci. Technol. Eng. Syst. J. 2(3), 245-253 (2017); View Description Validity and efficiency of conformal anomaly detection on big distributed data Ilia Nouretdinov Adv. Sci. Technol. Eng. Syst. J. 2(3), 254-267 (2017); View Description S-Parameters Optimization in both Segmented and Unsegmented Insulated TSV upto 40GHz Frequency Juma Mary Atieno, Xuliang Zhang, HE Song Bai Adv. Sci. Technol. Eng. Syst. J. 2(3), 268-276 (2017); View Description Synthesis of Important Design Criteria for Future Vehicle Electric System Lisa Braun, Eric Sax Adv. Sci. Technol. Eng. Syst. J. 2(3), 277-283 (2017); View Description Gestural Interaction for Virtual Reality Environments through Data Gloves G. Rodriguez, N. Jofre, Y. Alvarado, J. Fernández, R. Guerrero Adv. Sci. Technol. Eng. Syst. J. 2(3), 284-290 (2017); View Description Solving the Capacitated Network Design Problem in Two Steps Meriem Khelifi, Mohand Yazid Saidi, Saadi Boudjit Adv. Sci. Technol. Eng. Syst. J. 2(3), 291-301 (2017); View Description A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks Mohammad Nurul Afsar Shaon, Ken Ferens Adv. Sci. Technol. Eng. Syst. J. 2(3), 302-320 (2017); View Description Real Time Advanced Clustering System Giuseppe Spampinato, Arcangelo Ranieri Bruna, Salvatore Curti, Viviana D’Alto Adv. Sci. Technol. Eng. Syst. J. 2(3), 321-326 (2017); View Description Indoor Mobile Robot Navigation in Unknown Environment Using Fuzzy Logic Based Behaviors Khalid Al-Mutib, Foudil Abdessemed Adv. Sci. Technol. Eng. Syst. J. 2(3), 327-337 (2017); View Description Validity of Mind Monitoring System as a Mental Health Indicator using Voice Naoki Hagiwara, Yasuhiro Omiya, Shuji Shinohara, Mitsuteru Nakamura, Masakazu Higuchi, Shunji Mitsuyoshi, Hideo Yasunaga, Shinichi Tokuno Adv. Sci. Technol. Eng. Syst. J. 2(3), 338-344 (2017); View Description The Model of Adaptive Learning Objects for virtual environments instanced by the competencies Carlos Guevara, Jose Aguilar, Alexandra González-Eras Adv. Sci. Technol. Eng. Syst. J. 2(3), 345-355 (2017); View Description An Overview of Traceability: Towards a general multi-domain model Kamal Souali, Othmane Rahmaoui, Mohammed Ouzzif Adv. Sci. Technol. Eng. Syst. J. 2(3), 356-361 (2017); View Description L-Band SiGe HBT Active Differential Equalizers with Variable, Positive or Negative Gain Slopes Using Dual-Resonant RLC Circuits Yasushi Itoh, Hiroaki Takagi Adv. Sci. Technol. Eng. Syst. J. 2(3), 362-368 (2017); View Description Moving Towards Reliability-Centred Management of Energy, Power and Transportation Assets Kang Seng Seow, Loc K. Nguyen, Kelvin Tan, Kees-Jan Van Oeveren Adv. Sci. Technol. Eng. Syst. J. 2(3), 369-375 (2017); View Description Secure Path Selection under Random Fading Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 376-383 (2017); View Description Security in SWIPT with Power Splitting Eavesdropper Furqan Jameel, Faisal, M Asif Ali Haider, Amir Aziz Butt Adv. Sci. Technol. Eng. Syst. J. 2(3), 384-388 (2017); View Description Performance Analysis of Phased Array and Frequency Diverse Array Radar Ambiguity Functions Shaddrack Yaw Nusenu Adv. Sci. Technol. Eng. Syst. J. 2(3), 389-394 (2017); View Description Adaptive Discrete-time Fuzzy Sliding Mode Control For a Class of Chaotic Systems Hanene Medhaffar, Moez Feki, Nabil Derbel Adv. Sci. Technol. Eng. Syst. J. 2(3), 395-400 (2017); View Description Fault Tolerant Inverter Topology for the Sustainable Drive of an Electrical Helicopter Igor Bolvashenkov, Jörg Kammermann, Taha Lahlou, Hans-Georg Herzog Adv. Sci. Technol. Eng. Syst. J. 2(3), 401-411 (2017); View Description Computational Intelligence Methods for Identifying Voltage Sag in Smart Grid Turgay Yalcin, Muammer Ozdemir Adv. Sci. Technol. Eng. Syst. J. 2(3), 412-419 (2017); View Description A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation Ali Akbar Pammu, Kwen-Siong Chong, Bah-Hwee Gwee Adv. Sci. Technol. Eng. Syst. J. 2(3), 420-426 (2017); View Description Service Productivity and Complexity in Medical Rescue Services Markus Harlacher, Andreas Petz, Philipp Przybysz, Olivia Chaillié, Susanne Mütze-Niewöhner Adv. Sci. Technol. Eng. Syst. J. 2(3), 427-434 (2017); View Description Principal Component Analysis Application on Flavonoids Characterization Che Hafizah Che Noh, Nor Fadhillah Mohamed Azmin, Azura Amid Adv. Sci. Technol. Eng. Syst. J. 2(3), 435-440 (2017); View Description A Reconfigurable Metal-Plasma Yagi-Yuda Antenna for Microwave Applications Giulia Mansutti, Davide Melazzi, Antonio-Daniele Capobianco Adv. Sci. Technol. Eng. Syst. J. 2(3), 441-448 (2017); View Description Verifying the Detection Results of Impersonation Attacks in Service Clouds Sarra Alqahtani, Rose Gamble Adv. Sci. Technol. Eng. Syst. J. 2(3), 449-459 (2017); View Description Image Segmentation Using Fuzzy Inference System on YCbCr Color Model Alvaro Anzueto-Rios, Jose Antonio Moreno-Cadenas, Felipe Gómez-Castañeda, Sergio Garduza-Gonzalez Adv. Sci. Technol. Eng. Syst. J. 2(3), 460-468 (2017); View Description Segmented and Detailed Visualization of Anatomical Structures based on Augmented Reality for Health Education and Knowledge Discovery Isabel Cristina Siqueira da Silva, Gerson Klein, Denise Munchen Brandão Adv. Sci. Technol. Eng. Syst. J. 2(3), 469-478 (2017); View Description Intrusion detection in cloud computing based attack patterns and risk assessment Ben Charhi Youssef, Mannane Nada, Bendriss Elmehdi, Regragui Boubker Adv. Sci. Technol. Eng. Syst. J. 2(3), 479-484 (2017); View Description Optimal Sizing and Control Strategy of renewable hybrid systems PV-Diesel Generator-Battery: application to the case of Djanet city of Algeria Adel Yahiaoui, Khelifa Benmansour, Mohamed Tadjine Adv. Sci. Technol. Eng. Syst. J. 2(3), 485-491 (2017); View Description RFID Antenna Near-field Characterization Using a New 3D Magnetic Field Probe Kassem Jomaa, Fabien Ndagijimana, Hussam Ayad, Majida Fadlallah, Jalal Jomaah Adv. Sci. Technol. Eng. Syst. J. 2(3), 492-497 (2017); View Description Design, Fabrication and Testing of a Dual-Range XY Micro-Motion Stage Driven by Voice Coil Actuators Xavier Herpe, Matthew Dunnigan, Xianwen Kong Adv. Sci. Technol. Eng. Syst. J. 2(3), 498-504 (2017); View Description Self-Organizing Map based Feature Learning in Bio-Signal Processing Marwa Farouk Ibrahim Ibrahim, Adel Ali Al-Jumaily Adv. Sci. Technol. Eng. Syst. J. 2(3), 505-512 (2017); View Description A delay-dependent distributed SMC for stabilization of a networked robotic system exposed to external disturbances." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (June 2016): 513–19. http://dx.doi.org/10.25046/aj020366.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Khoruzhy, Liudmila Ivanovna, Roman Petrovich Bulyga, Olga Yuryevna Voronkova, Lidia Vladimirovna Vasyutkina, Natalya Ryafikovna Saenko, Andrey Leonidovich Poltarykhin, and Surendar Aravindhan. "A new trust management framework based on the experience of users in industrial cloud computing using multi-criteria decision making." Kybernetes, December 1, 2021. http://dx.doi.org/10.1108/k-05-2021-0378.

Повний текст джерела
Анотація:
Purpose Nowadays, cloud platforms are used in many fields, including e-commerce, web applications, data storage, healthcare, gaming, mobile social networks, etc. However, security and privacy are still two significant concerns in this area. The target of this paper is to present a system for trust management in industrial cloud computing using the multi-criteria decision making (MCDM) approach. MCDM techniques have been developed to accommodate a wide range of applications. As a result, hundreds of approaches have been generated with even minor variations on current approaches spawning new study fields. Design/methodology/approach Cloud computing provides a fully scalable, accessible and flexible computing platform for various applications. Due to the multiple applications that cloud computing has found in numerous life features, users and providers have considered providing security in cloud communications. Due to its distributive nature, dynamic space and lack of transparency in performing cloud computing, it faces many challenges in providing security. For security improvement, trust management can play a very influential role. This paper proposes a generic analytical methodology that uses a series of assessment criteria to evaluate current trust management testing prototypes in industrial cloud computing and related fields. The authors utilize a MCDM approach in the present article. Due to the multi-dimensionality of the sustainability objective and the complexities of socio-economic and biophysical processes, MCDM approaches have become progressively common in decision-making for sustainable energy. Findings The results of comparing and evaluating the performance of this model show its ability to manage trust and the ability to adapt to changes in the behavior of service providers quickly. Using a simulation, all results are confirmed. The results of simulations and evaluation of the present paper indicate that the proposed model provides a more accurate evaluation of the credibility of cloud service providers than other models. Practical implications The number of cloud services and customers is vast and extremely competitive in cloud environments, where novel cloud services and customers can join at any time, while others can withdraw whenever they want. Because of cloud services' highly dynamic and dispersed design, trust management mechanisms must be highly flexible to obtain feedback and update trust outcomes as quickly as possible. The model presented in this article tries to improve users' trust in the cloud industry. Originality/value Using a method (MCDM) to find the best trust management solution based on user experience in industrial cloud computing is the novelty of this paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lal, P. k. Venkateswar. "An Enhanced and Reliable Cloud Trust Protection Model for Privacy Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 06, no. 05 (June 13, 2022). http://dx.doi.org/10.55041/ijsrem15950.

Повний текст джерела
Анотація:
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is a significant concern to government and industry. We present a cloud architecture reference model that incorporates a wide range of security controls and best practices,and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP). Cloud-Trust is used to assess the security level of four multi- tenant IaaS cloud rchitectures equipped with alternative cloud security controls and to show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP an cloud tenantsystem administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs. Keywords: - Cloud Computing, Trust, Trust Management, Trust Models, Privacy, Trust metric, enables CSPs to start, stop, move, and restart
Стилі APA, Harvard, Vancouver, ISO та ін.
8

"Assessing Software Risks by Implementing Cloud Readiness and Benchmarking in the Pervasive Environments." International Journal of Engineering and Advanced Technology 9, no. 1S (December 14, 2019): 119–25. http://dx.doi.org/10.35940/ijeat.a1024.1091s19.

Повний текст джерела
Анотація:
The evolution of revolutionary computational paradigms has been witnessed in terms of the pervasive systems which not only offer evolving service portfolio but also integrated sensor data from variable sources but surfaces various challenges of data interaction, integration and adaptation. This research has been provisioned with the comprehensive focus on pervasive devices user interaction, access control modeling, identity management, trust and service discovery modeling. In addition, we also proposed a deep insight into Pervasive computing characteristics, risks, and risks models, environmental, ethical and social impacts. We have explored pervasive computing environment risk models by considering social, human and environmental risks. This state of art will create a case for developing new models for access control, identity, trust, risk management in ubiquitous or pervasive computing environments. The paper has implemented the benchmarking of smart applications by a smart tool by gathering various application and business metrices to improve software performance. This research has also implemented the cloud readiness of a pervasive power reader application for PaaS environment using a smart vendor solution. The cloud readiness score is evaluated by questionnaire qualitative information and source code scan. Various boosters and roadblocks are found out to give score to cloud readiness for any application.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Trust management; cloud service discovery; credibility"

1

Noor, Talal Hashem. "Credibility-based trust management and discovery of cloud services." Thesis, 2013. http://hdl.handle.net/2440/84252.

Повний текст джерела
Анотація:
Cloud computing is gaining a considerable momentum as a new computing paradigm for providing flexible and on-demand infrastructures, platforms and software as services. The trust management of services issues attracted many researchers in the past years. However, in cloud computing, with the highly dynamic, distributed and non-transparent nature of cloud services, this research area has gained a considerable significance. Robust trust management approaches will be essential in establishing trust between cloud service consumers and providers and will significantly contribute to the adoption and growth of cloud computing. In this dissertation, we present a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. We first propose a Zero-Knowledge Credibility Proof Protocol to prove the credibility of consumers’ feedback without breaching consumers’ privacy. We then propose an adaptive and robust Credibility Model for assessing the consumers’ credibility in giving feedback to cloud services. To measure how experienced a consumer would be, we use the concepts of Consumer Capability and Majority Consensus. We further introduce the concepts of Feedback Density and Occasional Feedback Collusion to detect strategic and occasional behaviors of collusion attacks. To detect Sybil attacks, we introduce the concepts of Multi-Identity Recognition and Occasional Sybil Attacks. To adjust trust results for cloud services that have been affected by malicious behaviors, we introduce the concept of Change Rate of Trust. We then propose a scalable Availability Model to manage the availability of the decentralized implementation of the trust management service. To share the workload between the trust management service nodes, we use the concept of load balancing thereby always maintaining a desired availability level. We introduce the concept of operational power to determine the optimal number of nodes and exploit particle filtering to precisely predict the availability of each node and determine the optimal number of replicas for each node. The techniques presented in this dissertation are implemented in Cloud Armor, a prototype that provides a set of functionalities to deliver Trust as a Service (TaaS). Finally, we conduct extensive experimental and performance studies of the proposed techniques using a collection of real-world trust feedbacks on cloud services. We particularly develop a Cloud Service Crawler Engine for cloud services collection. The collected datasets include meta-data of nearly 6,000 real-world cloud services (1.06GB). The experimental results shows that our system i) is able to effectively distinguish between feedbacks from experienced and amateur consumers; ii) is more adaptive and robust in trust calculations by effectively detecting collusion and Sybil attacks without breaching consumers’ privacy no matter attacks occur in a strategic or occasional behavior; iii) is more scalable and maintains a desired availability level in highly dynamic environments and iv) provides an efficient support for identifying, collecting, validating, categorizing and recommending cloud services based on trust.
Thesis (Ph.D.) -- University of Adelaide, School of Computer Science, 2013
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Trust management; cloud service discovery; credibility"

1

Noor, Talal H., and Quan Z. Sheng. "Credibility-Based Trust Management for Services in Cloud Environments." In Service-Oriented Computing, 328–43. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25535-9_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії