Search results for "Computer Security"
showing 10 items of 433 documents
A Simulation Framework for Evaluating Distributed Reputation Management Systems
2016
In distributed environments, where interactions involve unknown entities, intelligent techniques for estimating agents’ reputation are required. Reputation Management Systems (RMSs) aim to detect malicious behaviors that may affect the integrity of the virtual community. However, these systems are highly dependent of the application domain they address; hence the evaluation of different RMSs in terms of correctness and resistance to security attacks is frequently a tricky task. In this work we present a simulation framework to support researchers in the assessment of a RMS. The simulator is organized in two logic layers where network nodes are mapped to system processes that implement the i…
Reputation management in distributed systems
2008
Several distributed applications, implemented over today’s Internet, are based on the assumption that participating agents collaborate in order to achieve their own goal. However, when these applications are modelled as unstructured distributed systems, the greater autonomy and decentralization encourage antisocial behaviours, which are likely to cause performance degradation for the whole system. This paper presents a fully distributed reputation management system that allows the evaluation of agent reputation in unstructured environments without any centralized coordination. The proposed approach is based on game theory and is capable of capturing the highly dynamic nature of the involved…
A Novel Visual Interface to Foster Innovation in Mechanical Engineering and Protect from Patent Infringement
2018
One of the main time and money consuming tasks in the design of industrial devices and parts is the checking of possible patent infringements. Indeed, the great number of documents to be mined and the wide variety of technical language used to describe inventions are reasons why considerable amounts of time may be needed. On the other hand, the early detection of a possible patent conflict, in addition to reducing the risk of legal disputes, could stimulate a designers' creativity to overcome similarities in overlapping patents. For this reason, there are a lot of existing patent analysis systems, each with its own features and access modes. We have designed a visual interface providing an …
Vulnerability evaluation of distributed reputation management systems
2017
In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…
An extended JADE-S based framework for developing secure Multi-Agent Systems
2009
Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…
Reputation Management for Distributed Service-Oriented Architectures
2010
Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented Architecture (SOA) be augmented in order to support the declaration of this information. The correct behavior of such new SOA platforms, however, will depend on the presence of some mechanisms that allow consumer nodes to evaluate trustworthiness of service providers. This work proposes a new…
Information Organization and Visualization for the ALS Project
2010
This work presents the adopted methodology and the realized tools for data visualization in the Linguistic Atlas Of Sicily (ALS) Project. The ALS Project has the purpose to discovery new trends and variables to track the linguistic evolution over time and space in Sicily. The project is focused on how linguistic variables are related to social and economic aspects of the evolution of population and vice-versa. The visualization tools are a relevant aspect of the project to support decisions and disseminate results. One of the major factors is the geographic dependence of data evolution. To this aim complex set of tools has been developed: some tools are stand-alone while others are collabor…
Data Communication Security of Advanced Metering Infrastructure in Smart Grid
2013
Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…
DETECTING FALLS AT HOME: USER-CENTERED DESIGN OF A PERVASIVE TECHNOLOGY
2016
Falling is the main cause of domestic accidents and fatal injuries to seniors at home. In this paper, we describe the design process for a new pervasive technology (CIRDO). The aim of this technology is to detect falls (via audio and video sensors) and to alert the elderly's family or caregivers. Two complementary studies were performed. Firstly, the actual risk situations of older adults were analyzed. Secondly, social acceptance was investigated for the different homecare field stakeholders. Our results highlight the tensions among social actors towards the tool and their impacts on technology acceptance by the elderly. Also, we show a significant change in the fall process due to the dev…
Cyber-Identities and Social Life in Cyberspace
2011
Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…