Search Results

Results (36)

Search Parameters:

Keyword: Trust
Order results
Results per page
Open AccessArticle
22 Pages, 15,097 KB Download PDF

TIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 1–22, 2025; DOI: 10.25046/aj100601
Abstract:

Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
Open AccessArticle
12 Pages, 1,683 KB Download PDF

Deploying Trusted and Immutable Predictive Models on a Public Blockchain Network

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 72–83, 2024; DOI: 10.25046/aj090307
Abstract:

Machine learning-based predictive models often face challenges, particularly biases and a lack of trust in their predictions when deployed by individual agents. Establishing a robust deployment methodology that supports validating the accuracy and fairness of these models is a critical endeavor. In this paper, we introduce a novel approach to deploying predictive models, such as…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,136 KB Download PDF

A Secure Trust Aware ACO-Based WSN Routing Protocol for IoT

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 95–105, 2022; DOI: 10.25046/aj070311
Abstract:

The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 751 KB Download PDF

Component of Trust for Developing Crowdwork System: A Systematic Literature Review

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 356–363, 2020; DOI: 10.25046/aj050544
Abstract:

Crowdwork is a system that brings job providers and crowdworkers in a portal. Nowadays, many companies are turning to freelancing rather than hiring full-time employees. In addition, the workers have also switched to working as freelancers. New problems also arise in the crowdwork system. Trust is one of the main issues that arise in the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 805 KB Download PDF

The Sound of Trust: Towards Modelling Computational Trust using Voice-only Cues at Zero-Acquaintance

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 469–476, 2020; DOI: 10.25046/aj050456
Abstract:

Trust is essential in many interdependent human relationships. Trustworthiness is measured via the effectiveness of the relationships involving human perception. The decision to trust others is often made quickly (even at zero acquaintance). Previous research has shown the significance of voice in perceived trustworthiness. However, the listeners’ characteristics were not considered. A system has yet…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 1,198 KB Download PDF

Trust and Reputation Mechanisms in Vehicular Ad-Hoc Networks: A Systematic Review

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 387–402, 2020; DOI: 10.25046/aj050150
Abstract:

An emerging trend has been observed in the Trust and Reputation (T & R) systems in field of decision-making support for a majority of the provisions propagated by the Internet. It is the extreme importance that peers (users) are able to trust each other and rely on them for file sharing and for services. This…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,057 KB Download PDF

Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 30–35, 2017; DOI: 10.25046/aj020305
Abstract:

Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers.  Traditional data center security best practices involving network segmentation are not well suited to these new environments.  We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
12 Pages, 1,302 KB Download PDF

Federated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 65–76, 2025; DOI: 10.25046/aj100606
Abstract:

The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
8 Pages, 547 KB Download PDF

Dismantle Shilling Attacks in Recommendations Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 684–691, 2021; DOI: 10.25046/aj060174
Abstract:

Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 2,626 KB Download PDF

Technical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 283–294, 2022; DOI: 10.25046/aj070632
Abstract:

In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Safety Science (SFS))
Open AccessArticle
15 Pages, 366 KB Download PDF

Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 156–170, 2022; DOI: 10.25046/aj070216
Abstract:

Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 428 KB Download PDF

Taxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 25–31, 2022; DOI: 10.25046/aj070203
Abstract:

The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
12 Pages, 1,087 KB Download PDF

Comparative Analysis and Modern Applications of PoW, PoS, PPoS Blockchain Consensus Mechanisms and New Distributed Ledger Technologies

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 279–290, 2021; DOI: 10.25046/aj060531
Abstract:

Central authorities have registered economic transactions based on trust since the dawn of time. With the advent of paper, methods for documenting transactions and records became more difficult and detailed. With the widespread use of computers in recent years, digital recording has made record keeping easier and since then every technical advancement has made data…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 821 KB Download PDF

Leveraging Energy Efficiency Investments: An Innovative Web-based Benchmarking Tool

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 237–248, 2021; DOI: 10.25046/aj060526
Abstract:

Energy Efficiency (EE) plays a key role in decreasing energy consumption at a European level, while it is considered as one of the most cost-efficient means to achieve carbon reduction and reinforce energy sufficiency and security. EE financing is imperative to implement measures that will lead to achieving the desired carbon neutrality and, thus, avert…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Green & Sustainable Science & Technology (GSS))
Open AccessArticle
9 Pages, 887 KB Download PDF

A Review on TAM and TOE Framework Progression and How These Models Integrate

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 3, Page # 137–145, 2021; DOI: 10.25046/aj060316
Abstract:

The TAM is a model that is widely used to understand IT adoption and usage process accordingly and the reason for its popularity is that the model clarifies variances like behavioral intention (BI) relevant to IT appropriation and use over a broad range of settings. The model’s main factors for system use is perceived usefulness…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Engineering Management (EMM))
Open AccessArticle
10 Pages, 1,188 KB Download PDF

Factors Affecting Behavioural Intention to Shop in Self-Service Retail Case Study: JD.ID X Mart

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 285–294, 2021; DOI: 10.25046/aj060233
Abstract:

This paper aims to measure the acceptance level of Indonesian customers to JD.ID X retail and to reveal the driving factors of behavioral intention to shop at the retail. JD.ID X is new retail that implements a new shopping technology called Just walk-out technology (JWOT) also known as retail without a cashier. JWOT is one…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 958 KB Download PDF

Blockchain Technology-Based Good Distribution Practice Model of Pharmacy Industry in Indonesia

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 267–273, 2021; DOI: 10.25046/aj060230
Abstract:

Distribution is the main activity in integrated product supply chain management. In the pharmaceutical industry, the process of drug distribution is important because of the handling, storage, and distribution of medicinal products with good standards and quality. The problem that occurs in the pharmaceutical industry is the circulation of counterfeit drugs by related parties, for…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 699 KB Download PDF

Factors Impacting Digital Payment Adoption: An Empirical Evidence from Smart City of Dubai

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1208–1214, 2021; DOI: 10.25046/aj0601137
Abstract:

The emergence of new digital payment technologies has introduced both opportunities and challenges across all industries. This research aims to examine the significant factors that influence the adoption of new e-payment technologies, specifically in smart cities, as in Dubai. A comprehensive theoretical framework based on several previous studies included the following factors; Perceived Usefulness, Perceived…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 546 KB Download PDF

Modified Blockchain based Hardware Paradigm for Data Provenance in Academia

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 66–77, 2021; DOI: 10.25046/aj060108
Abstract:

Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
6 Pages, 1,433 KB Download PDF

Education Value Chain Model for Examination, Grading, and Evaluation Process in Higher Education based on Blockchain Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1698–1703, 2020; DOI: 10.25046/aj0506202
Abstract:

Blockchain is a solution to improve data integrity and minimize data manipulation. Blockchain technology can be used in student examination management in universities. The process of managing student examination produces some information that can be stored in a blockchain database such as information about the lecturer as the exam creator, exam proctor, student attendance, student…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 886 KB Download PDF

Time Granularity-based Privacy Protection for Cloud Metering Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1278–1285, 2020; DOI: 10.25046/aj0506152
Abstract:

Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
7 Pages, 999 KB Download PDF

5G, Vehicle to Everything Communication: Opportunities, Constraints and Future Directions

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1089–1095, 2020; DOI: 10.25046/aj0506132
Abstract:

The 5G, as a new source of telecommunication infrastructure technology, has attracted many stakeholders to promote the progress of its standards and the development of its technology industry. The 5G reinforces new technologies and delivers vehicles for everything services (V2X) to drivers and passengers. It also offers several advantages. On the other hand, due to…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Telecommunications (TEL))
Open AccessArticle
5 Pages, 713 KB Download PDF

An Empirical Study on Factors Influencing the Intention to use Mobile Learning

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1261–1265, 2020; DOI: 10.25046/aj0505151
Abstract:

Lately, the use of mobile learning has increased in higher education at a global level. Especially after the new Coronavirus (Covid-19). Therefore, trust issues towards the benefits of mobile learning are still important matters just as important as quality dimensions (e.g. service quality, information quality and system quality) for both technology and its content. These…

Read More
(This article belongs to Section Theory & Methods in Computer Science (CTM))
Open AccessArticle
6 Pages, 669 KB Download PDF

Factors Influencing the Intention to Use Technology Services to Implement Self-Service Technology Case Study: Situation Pandemic Covid-19

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 342–347, 2020; DOI: 10.25046/aj050542
Abstract:

This study aims to analyze a person’s intention in using self-service technology (SST) services during the pandemic COVID-19. Where this time, raising problems one of the social distancing that affects a service provided, especially on services that use technology that applies SST. This study develops from previous research where the customer has satisfaction in using…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026