Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is fou...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
The paper presents a set of concepts which can establish a basis for the creation of new evaluation ...
. Existing authorization mechanisms fail to provide powerful and robust tools for handling security ...
Currently, there is an increasing tendency to migrate the management of communications and informati...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Reputation Management is rather a new field in the realm of computer security. This is mainly due to...
In this report, we present a feedback-based system for managing trust and detecting malicious behavi...
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications ac...
Collaborative applications like online markets, social network communities, and P2P file sharing sit...
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booki...
The continued advances in service-oriented computing and global communications have created a strong...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse u...
The advent of digital environments has generated significant benefits for businesses, organizations,...
Trust management is an important issue in the analysis and design of secure information systems. Thi...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
The paper presents a set of concepts which can establish a basis for the creation of new evaluation ...
. Existing authorization mechanisms fail to provide powerful and robust tools for handling security ...
Currently, there is an increasing tendency to migrate the management of communications and informati...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Reputation Management is rather a new field in the realm of computer security. This is mainly due to...
In this report, we present a feedback-based system for managing trust and detecting malicious behavi...
Autonomic systems are needed to self-manage the increasing complexity of pervasive communications ac...
Collaborative applications like online markets, social network communities, and P2P file sharing sit...
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booki...
The continued advances in service-oriented computing and global communications have created a strong...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse u...
The advent of digital environments has generated significant benefits for businesses, organizations,...
Trust management is an important issue in the analysis and design of secure information systems. Thi...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
The paper presents a set of concepts which can establish a basis for the creation of new evaluation ...
. Existing authorization mechanisms fail to provide powerful and robust tools for handling security ...