Search results for "Computer Security"

showing 10 items of 433 documents

A Simulation Framework for Evaluating Distributed Reputation Management Systems

2016

In distributed environments, where interactions involve unknown entities, intelligent techniques for estimating agents’ reputation are required. Reputation Management Systems (RMSs) aim to detect malicious behaviors that may affect the integrity of the virtual community. However, these systems are highly dependent of the application domain they address; hence the evaluation of different RMSs in terms of correctness and resistance to security attacks is frequently a tricky task. In this work we present a simulation framework to support researchers in the assessment of a RMS. The simulator is organized in two logic layers where network nodes are mapped to system processes that implement the i…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCorrectnessComputer scienceDistributed computingmedia_common.quotation_subjectComputer Science (all)Message Passing InterfaceSimulation framework020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreTask (project management)Distributed reputation managementControl and Systems EngineeringApplication domain020204 information systemsSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringMultiagent systemcomputerReputation managementVirtual communityReputationmedia_common
researchProduct

Reputation management in distributed systems

2008

Several distributed applications, implemented over today’s Internet, are based on the assumption that participating agents collaborate in order to achieve their own goal. However, when these applications are modelled as unstructured distributed systems, the greater autonomy and decentralization encourage antisocial behaviours, which are likely to cause performance degradation for the whole system. This paper presents a fully distributed reputation management system that allows the evaluation of agent reputation in unstructured environments without any centralized coordination. The proposed approach is based on game theory and is capable of capturing the highly dynamic nature of the involved…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitbusiness.industryComputer scienceDistributed computingmedia_common.quotation_subjectComputer securitycomputer.software_genreDecentralizationFree ridingDistributed SystemIncentiveOrder (exchange)The InternetbusinessGame theorycomputerReputationReputationmedia_common2008 3rd International Symposium on Communications, Control and Signal Processing
researchProduct

A Novel Visual Interface to Foster Innovation in Mechanical Engineering and Protect from Patent Infringement

2018

One of the main time and money consuming tasks in the design of industrial devices and parts is the checking of possible patent infringements. Indeed, the great number of documents to be mined and the wide variety of technical language used to describe inventions are reasons why considerable amounts of time may be needed. On the other hand, the early detection of a possible patent conflict, in addition to reducing the risk of legal disputes, could stimulate a designers' creativity to overcome similarities in overlapping patents. For this reason, there are a lot of existing patent analysis systems, each with its own features and access modes. We have designed a visual interface providing an …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniHistoryVisual languageComputer sciencePatent infringement detection05 social sciencesPatent infringementComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technology050905 science studiesComputer securitycomputer.software_genreComputer Science ApplicationsEducationindustrial design.Semantic database0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingmechanical0509 other social sciencesVisual interfacecomputer
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct

Reputation Management for Distributed Service-Oriented Architectures

2010

Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented Architecture (SOA) be augmented in order to support the declaration of this information. The correct behavior of such new SOA platforms, however, will depend on the presence of some mechanisms that allow consumer nodes to evaluate trustworthiness of service providers. This work proposes a new…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)Distributed SOAbusiness.industryComputer sciencecomputer.internet_protocolQuality of servicemedia_common.quotation_subjectMobile QoSService-oriented architectureService providercomputer.software_genreComputer securityQoS-based Service SelectionThe InternetReputation ManagementWeb servicebusinesscomputerComputer networkReputationmedia_common2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop
researchProduct

Information Organization and Visualization for the ALS Project

2010

This work presents the adopted methodology and the realized tools for data visualization in the Linguistic Atlas Of Sicily (ALS) Project. The ALS Project has the purpose to discovery new trends and variables to track the linguistic evolution over time and space in Sicily. The project is focused on how linguistic variables are related to social and economic aspects of the evolution of population and vice-versa. The visualization tools are a relevant aspect of the project to support decisions and disseminate results. One of the major factors is the geographic dependence of data evolution. To this aim complex set of tools has been developed: some tools are stand-alone while others are collabor…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazionieducation.field_of_studybusiness.industryComputer scienceProcess (engineering)Principal (computer security)PopulationInformation Visualization GIS science Data AggregationPragmaticsData scienceVisualizationInformation visualizationData visualizationbusinesseducationNatural language2010 International Conference on Complex, Intelligent and Software Intensive Systems
researchProduct

Data Communication Security of Advanced Metering Infrastructure in Smart Grid

2013

Advanced Metering Infrastructure (AMI) is very critical part for wired/wireless communication in Smart Grid. It involves communication of vital smart metering data to central control center for smooth functioning of smart grid. Security and reliability of data is of paramount importance for operational reliability of smart grid. AMI network is susceptible to many cyber security threats and attacks. Therefore it is desirable to prevent the data from such vulnerabilities. The paper proposes two-phase method to provide security of data using dedicated authentication server which inhibits malicious and unauthorized nodes to gain access to AMI communication network. Secure environment is created…

Smart meterComputer scienceNetwork packetWireless networkbusiness.industryAuthentication serverCommunications securityComputer securitycomputer.software_genreSmart gridSecurity servicebusinesscomputerAutomatic meter readingComputer network2013 5th International Conference on Computational Intelligence and Communication Networks
researchProduct

DETECTING FALLS AT HOME: USER-CENTERED DESIGN OF A PERVASIVE TECHNOLOGY

2016

Falling is the main cause of domestic accidents and fatal injuries to seniors at home. In this paper, we describe the design process for a new pervasive technology (CIRDO). The aim of this technology is to detect falls (via audio and video sensors) and to alert the elderly's family or caregivers. Two complementary studies were performed. Firstly, the actual risk situations of older adults were analyzed. Secondly, social acceptance was investigated for the different homecare field stakeholders. Our results highlight the tensions among social actors towards the tool and their impacts on technology acceptance by the elderly. Also, we show a significant change in the fall process due to the dev…

Social PsychologyIterative designComputer scienceProcess (engineering)Video sensorsApplied psychology[SHS.PSY]Humanities and Social Sciences/PsychologyComputer securitycomputer.software_genreField (computer science)050906 social workmedicine0501 psychology and cognitive sciences050107 human factorsUser-centered designelderly peoplelcsh:T58.5-58.64lcsh:Information technologypervasive technologyCommunication05 social sciencesHuman-Computer Interactionrisk situationFalling (accident)Pervasive technologydomestic activity0509 other social sciencesmedicine.symptomEngineering design processcomputeracceptance
researchProduct

Cyber-Identities and Social Life in Cyberspace

2011

Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-pr…

Social lifebusiness.industryInternet privacySociologyComputer securitycomputer.software_genrebusinessCyberspacecomputerPseudonymityAnonymity
researchProduct