Hybrid journal (It can contain Open Access articles) ISSN (Print) 2048-8378 - ISSN (Online) 2048-8386 Published by Inderscience Publishers[439 journals]
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Satvir Singh, Min Zhu, Huaqing Wang Pages: 95 - 110 Abstract: We live in a globalised context due to internet communications and computing technology. Given the false or misleading information provided by some information service providers, there may be a rising distrust of internet-based material. In this paper, the goal was to evaluate the distrust of internet material, using a social demographic theoretical lens. The results of the study were fascinating, because the distrust for social media was higher than other internet communications. Males distrusted internet communications more than females. In contrast, American Indian and black females trusted internet communications more than males. The results of this study should generalise to marketing discipline practitioners such as new business product/service development and also to national policy makers. Keywords: trust management; internet distrust; survey; social culture; consumer behaviour Citation: International Journal of Trust Management in Computing and Communications, Vol. 4, No. 2 (2018) pp. 95 - 110 PubDate: 2018-10-12T23:20:50-05:00 DOI: 10.1504/IJTMCC.2018.095608 Issue No:Vol. 4, No. 2 (2018)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Anant V. Nimkar, Soumya K. Ghosh Pages: 111 - 131 Abstract: Cloud federation provides computing services of internal and external cloud providers. These computing services (e.g., virtual resources or services etc.) are collectively owned, accessed and controlled by one or more federating participants like user, broker, cloud providers, service provider etc. Thus, subjects are subsets of federating participants for use, execution, deployment and management of computing services. Each such subject must be authenticated before authorisation of computing services. Identity management solutions cannot address authentication of subjects comprising of more than two federating participants. In this paper, we propose a protocol for authentication (called as caucus authentication protocol) of subjects as a subset of one or more federating participants using a variant of multi-party computation (MPC). Theoretical study attempts to prove liveness and safety properties of proposed caucus authentication protocol (CAP) for the validation of dead-lock-free communication. The simulation results show that the protocol provides authentication of subjects in acceptable response time. Keywords: mandatory access control; MAC; discretionary access control; DAC; multi-party computation; MPC; IaaS; SaaS; cloud; federation; authentication; security; access control Citation: International Journal of Trust Management in Computing and Communications, Vol. 4, No. 2 (2018) pp. 111 - 131 PubDate: 2018-10-12T23:20:50-05:00 DOI: 10.1504/IJTMCC.2018.095609 Issue No:Vol. 4, No. 2 (2018)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:Hisham Salah, Mohamed Eltoweissy Pages: 132 - 171 Abstract: Current technologies to include cloud computing, social networking, and mobile applications, coupled with the explosion in storage and processing power, are evolving massive-scale marketplaces for a wide variety of resources and services. In such marketplaces, interaction parties are largely autonomous with vastly diverse requirements, capabilities, and trust profiles. Thus, placing challenges against trustworthy interactions and transactions. We claim the need for customisable trust management system that can be personalised for the robustness and wide-scale adoption of such marketplaces. In this paper, we present reference architecture which decouples trust management operations and defines five interrelated reconfigurable components. The components which collectively can be used to implement a wide spectrum of trust management systems ranging from generic to highly personalised. We used the proposed architecture to implement a personalised and a generic trust management system. Our evaluations showed higher effectiveness and efficiency results in case of personalised trust, in addition to resilience and scalability. Keywords: trust management; reputation management; personalised trust; trust architecture; customisable systems; dynamic clustering Citation: International Journal of Trust Management in Computing and Communications, Vol. 4, No. 2 (2018) pp. 132 - 171 PubDate: 2018-10-12T23:20:50-05:00 DOI: 10.1504/IJTMCC.2018.095612 Issue No:Vol. 4, No. 2 (2018)
Please help us test our new pre-print finding feature by giving the pre-print link a rating. A 5 star rating indicates the linked pre-print has the exact same content as the published article.
Authors:R. Jayashree, A. Christy, S. Venkatesh Pages: 172 - 191 Abstract: An efficient and effective way to construct trust relationship among peer users in electronic learning environment is ranking. User-driven ranking systems are based only on the feedback or ratings provided by the users. Users with higher points obtain high reputation compared to less scored users. In popular question-answering websites, like stack exchange network sites, users with unanswered or ignored questions for a long time get a tumbleweed badge without considering their past history. The question-answering website community considers this award as a consolation prize and discourages the awardees instead of encouraging them. Most of the people who ask Tumbleweed questions are new or low-reputation users. The focus of this research work is to design a recommendation system that prevent tumbleweed questions from the users who are about to receive a tumbleweed badge. A splay tree is a binary search tree with a self-balancing skill which brings the recently accessed item to the top of the tree. In this paper, the splay tree represents users' ranks with methods to avoid tumbleweed badge. The spotlight of the work is to bring up average or below average scorer to top without affecting existing topers. Keywords: collaborative work; electronic learning; learning; ranking; tree data structure; feedback; websites Citation: International Journal of Trust Management in Computing and Communications, Vol. 4, No. 2 (2018) pp. 172 - 191 PubDate: 2018-10-12T23:20:50-05:00 DOI: 10.1504/IJTMCC.2018.095621 Issue No:Vol. 4, No. 2 (2018)