Results (36)
Search Parameters:
Keyword: TrustTIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture
Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…
Read MoreDeploying Trusted and Immutable Predictive Models on a Public Blockchain Network
Machine learning-based predictive models often face challenges, particularly biases and a lack of trust in their predictions when deployed by individual agents. Establishing a robust deployment methodology that supports validating the accuracy and fairness of these models is a critical endeavor. In this paper, we introduce a novel approach to deploying predictive models, such as…
Read MoreA Secure Trust Aware ACO-Based WSN Routing Protocol for IoT
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…
Read MoreComponent of Trust for Developing Crowdwork System: A Systematic Literature Review
Crowdwork is a system that brings job providers and crowdworkers in a portal. Nowadays, many companies are turning to freelancing rather than hiring full-time employees. In addition, the workers have also switched to working as freelancers. New problems also arise in the crowdwork system. Trust is one of the main issues that arise in the…
Read MoreThe Sound of Trust: Towards Modelling Computational Trust using Voice-only Cues at Zero-Acquaintance
Trust is essential in many interdependent human relationships. Trustworthiness is measured via the effectiveness of the relationships involving human perception. The decision to trust others is often made quickly (even at zero acquaintance). Previous research has shown the significance of voice in perceived trustworthiness. However, the listeners’ characteristics were not considered. A system has yet…
Read MoreSecuring Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model
In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…
Read MoreTrust and Reputation Mechanisms in Vehicular Ad-Hoc Networks: A Systematic Review
An emerging trend has been observed in the Trust and Reputation (T & R) systems in field of decision-making support for a majority of the provisions propagated by the Internet. It is the extreme importance that peers (users) are able to trust each other and rely on them for file sharing and for services. This…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreFederated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review
The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…
Read MoreDismantle Shilling Attacks in Recommendations Systems
Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…
Read MoreTechnical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems
In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MoreComparative Analysis and Modern Applications of PoW, PoS, PPoS Blockchain Consensus Mechanisms and New Distributed Ledger Technologies
Central authorities have registered economic transactions based on trust since the dawn of time. With the advent of paper, methods for documenting transactions and records became more difficult and detailed. With the widespread use of computers in recent years, digital recording has made record keeping easier and since then every technical advancement has made data…
Read MoreLeveraging Energy Efficiency Investments: An Innovative Web-based Benchmarking Tool
Energy Efficiency (EE) plays a key role in decreasing energy consumption at a European level, while it is considered as one of the most cost-efficient means to achieve carbon reduction and reinforce energy sufficiency and security. EE financing is imperative to implement measures that will lead to achieving the desired carbon neutrality and, thus, avert…
Read MoreA Review on TAM and TOE Framework Progression and How These Models Integrate
The TAM is a model that is widely used to understand IT adoption and usage process accordingly and the reason for its popularity is that the model clarifies variances like behavioral intention (BI) relevant to IT appropriation and use over a broad range of settings. The model’s main factors for system use is perceived usefulness…
Read MoreFactors Affecting Behavioural Intention to Shop in Self-Service Retail Case Study: JD.ID X Mart
This paper aims to measure the acceptance level of Indonesian customers to JD.ID X retail and to reveal the driving factors of behavioral intention to shop at the retail. JD.ID X is new retail that implements a new shopping technology called Just walk-out technology (JWOT) also known as retail without a cashier. JWOT is one…
Read MoreBlockchain Technology-Based Good Distribution Practice Model of Pharmacy Industry in Indonesia
Distribution is the main activity in integrated product supply chain management. In the pharmaceutical industry, the process of drug distribution is important because of the handling, storage, and distribution of medicinal products with good standards and quality. The problem that occurs in the pharmaceutical industry is the circulation of counterfeit drugs by related parties, for…
Read MoreFactors Impacting Digital Payment Adoption: An Empirical Evidence from Smart City of Dubai
The emergence of new digital payment technologies has introduced both opportunities and challenges across all industries. This research aims to examine the significant factors that influence the adoption of new e-payment technologies, specifically in smart cities, as in Dubai. A comprehensive theoretical framework based on several previous studies included the following factors; Perceived Usefulness, Perceived…
Read MoreModified Blockchain based Hardware Paradigm for Data Provenance in Academia
Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…
Read MoreEducation Value Chain Model for Examination, Grading, and Evaluation Process in Higher Education based on Blockchain Technology
Blockchain is a solution to improve data integrity and minimize data manipulation. Blockchain technology can be used in student examination management in universities. The process of managing student examination produces some information that can be stored in a blockchain database such as information about the lecturer as the exam creator, exam proctor, student attendance, student…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read More5G, Vehicle to Everything Communication: Opportunities, Constraints and Future Directions
The 5G, as a new source of telecommunication infrastructure technology, has attracted many stakeholders to promote the progress of its standards and the development of its technology industry. The 5G reinforces new technologies and delivers vehicles for everything services (V2X) to drivers and passengers. It also offers several advantages. On the other hand, due to…
Read MoreAn Empirical Study on Factors Influencing the Intention to use Mobile Learning
Lately, the use of mobile learning has increased in higher education at a global level. Especially after the new Coronavirus (Covid-19). Therefore, trust issues towards the benefits of mobile learning are still important matters just as important as quality dimensions (e.g. service quality, information quality and system quality) for both technology and its content. These…
Read MoreFactors Influencing the Intention to Use Technology Services to Implement Self-Service Technology Case Study: Situation Pandemic Covid-19
This study aims to analyze a person’s intention in using self-service technology (SST) services during the pandemic COVID-19. Where this time, raising problems one of the social distancing that affects a service provided, especially on services that use technology that applies SST. This study develops from previous research where the customer has satisfaction in using…
Read More
