Filters
total: 188
filtered: 175
-
Catalog
Chosen catalog filters
Search results for: TRUST MANAGEMENT
-
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)
PublicationThis paper focuses on the complex dynamics of trust and distrust in digital government technologies by approaching the cancellation of machine voting in the Netherlands (2006-07). This case describes how a previously trusted system can collapse, how paradoxical the relationship between trust and distrust is, and how it interacts with adopting and managing electoral technologies. The analysis stresses how, although...
-
How can we justify trust in software based systems?
PublicationArtykuł wprowadza pojęcie ''trust case'' i wyjasnia jego znaczenie w kontekście systemów informatycznych. Przedstawia również doświadczenia zdobyte w trakcie budowy trust case dla złożonego systemu IT przeznaczonego do wspomagania procesów dystrybucji i stosowania leków. Przedstawia również szereg otwartych problemów badawczych dotyczacych budowy i zarządzanie dowodami zaufania (trust case).
-
Belief in the importance of socially responsible behaviors – the significance of trust and personal experiences with COVID-19
PublicationA vast number of studies have shown that trust is related to socially desirable traits and behaviors. In the present research we have investigated the relationship between generalized trust and beliefs about the importance of socially responsible behaviors (SRB) during the pandemic – namely, following the sanitary regime and getting vaccinated. Basing on the previous findings we assumed that trustful people...
-
An approach to evaluation of arguments in trust cases
PublicationTrustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of varying quality. They can be complex...
-
An Approach to Trust Case Development
PublicationIn the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...
-
Collaborative approach to trustworthiness of it infrastructures
PublicationArtykuł wprowadza koncepcję ''trust case'' i wyjaśnia jak jest ona używana w celu uzasadnienia zaufania do systemów i infrastruktur IT. W szczególności skoncentrowano się na procesie budowy trust case, wyjasniono jego strukturę oraz podkreślono konieczność włączenia do procesu właściwych udziałowców. Załączono również informację na temat funkcjonalnej struktury narzedzi wspomagających zarządzanie trust case w ramach jego cyklu...
-
Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty
PublicationThis paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...
-
Clustering Context Items into User Trust Levels
PublicationAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Argument strategies and patterns of the Trust-IT framework
PublicationArtykuł dotyczy metodologicznego i narzędziowego środowiska Trust-IT wspierającego budowę dowodów zaufania (ang. trust case), a w szczególności strategii tworzenia dowodu zaufania. Strategia uzależniona jest od właściwości systemu (lub innego rozważanego obiektu), która podlega analizie w ramach dowodu zaufania. W artykule zaprezentowano dwie strategie: oparta na ryzyku i oparta na standardach oraz omówiono kilka często stosowanych...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublicationIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublicationThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
Praca z normą Common Criteria wspomagana szablonami Trust Case
PublicationTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Metoda jest przedmiotem intensywnych badań. Jeden z kierunków rozwoju dotyczy tworzenia szablonów oceny zgodności ze standardami. Szablon Trust Case jest odwzorowaniem wymagań zawartych w normie w strukturę drzewa dowodowego....
-
Supporting Assurance by Evidence-based Argument Services
PublicationStructured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...
-
The effects of perceived risk, brand value, and brand trust on eWOM
PublicationUnrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublicationTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
A theoretical framework for understanding trust and distrust in internet voting
PublicationEach and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublicationA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Do personality traits influence the user’s behavioral intention to adopt and use Open Government Data (OGD)? An empirical investigation
PublicationThe academic interest in the Open Government Data (OGD) domain has been burgeoning over the years. Conceding that the prime focus of an OGD initiative is its further re-use for value creation and innovation by stakeholders, the present study seeks to underscore the role of HEXACO personality traits on behavioral intention (BI) to adopt and use OGD in developing countries' context. We investigate the direct, indirect, and moderating...
-
Expedited Design Closure of Antennas By Means Of Trust-Region-Based Adaptive Response Scaling
PublicationIn the letter, a reliable procedure for expedited design optimization of antenna structures by means of trust-region adaptive response scaling (TR-ARS) is proposed. The presented approach exploits two-level electromagnetic (EM) simulation models. A predicted high-fidelity model response is obtained by applying nonlinear frequency and amplitude correction to the low-fidelity model. The surrogate created this way is iteratively rebuilt...
-
Specification-Oriented Automatic Design of Topologically Agnostic Antenna Structure
PublicationDesign of antennas for modern applications is a challenging task that combines cognition-driven development of topology intertwined with tuning of its parameters using rigorous numerical optimization. However, the process can be streamlined by neglecting the engineering insight in favor of automatic de-termination of structure geometry. In this work, a specification-oriented design of topologically agnostic antenna is considered....
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks
PublicationThe paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.
-
On EM-driven size reduction of antenna structures with explicit constraint handling
PublicationSimulation-driven miniaturization of antenna components is a challenging task mainly due to the presence of expensive constraints, evaluation of which involves full-wave electromagnetic (EM) analysis. The recommended approach is implicit constraint handling using penalty functions, which, however, requires a meticulous selection of penalty coefficients, instrumental in ensuring optimization process reliability. This paper proposes...
-
Fast Antenna Optimization Using Gradient Monitoring and Variable-Fidelity EM Models
PublicationAccelerated simulation-driven design optimization of antenna structures is proposed. Variable-fidelity electromagnetic (EM) analysis is used as well as the trust-region framework with limited sensitivity updates. The latter are controlled by monitoring the changes of the antenna response gradients. Our methodology is verified using three compact wideband antennas. Comprehensive benchmarking demonstrates its superiority over both...
-
Rapid design optimization of antennas using variable-fidelity EM models and adjoint sensitivities
PublicationPurpose – Development of techniques for expedited design optimization of complex and numerically expensive electromagnetic (EM) simulation models of antenna structures validated both numerically and experimentally. The paper aims to discuss these issues. Design/methodology/approach – The optimization task is performed using a technique that combines gradient search with adjoint sensitivities, trust region framework, as well as...
-
A Novel Trust-Region-Based Algorithm with Flexible Jacobian Updates for Expedited Optimization of High-Frequency Structures
PublicationSimulation-driven design closure is mandatory in the design of contemporary high-frequency components. It aims at improving the selected performance figures through adjustment of the structure’s geometry (and/or material) parameters. The computational cost of this process when employing numerical optimization is often prohibitively high, which is a strong motivation for the development of more efficient methods. This is especially...
-
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions
PublicationWe consider a generic model of Client-Server interactions in the presence of Sender and Relay, conceptual agents acting on behalf of Client and Server, respectively, and modeling cloud service providers in the envisaged "QoS as a Service paradigm". Client generates objects which Sender tags with demanded QoS level, whereas Relay assigns the QoS level to be provided at Server. To verify an object's right to a QoS level, Relay detects...
-
Trust-IT - a framework for trust cases
PublicationArtykul prezentuje wyniki uzyskane w ramach prac zmierzających do wytworzenia zintegrowanego srodowiska wspomagającego analizę zaufania do systemów i infrastruktur informatycznych. Elementy tego środowiska obejmują język i metodykę trorzenia i pielęgnacji dowodów zaufania (ang. trust case), mtode integrowania z nimi materiału dowodowego, narzędzia wspomagajace zarządzanie dowodami zaufania oraz scenariusze ich wykorzystania w różnych...
-
SCF - a Framework Supporting Achieving and Assessing Conformity with Standards
PublicationStandards Conformity Framework (SCF) presented in this paper encompasses methods and tools whichprovide support for application of standards and other normative documents. The approach taken focuses ondevelopment, assessment and maintenance of an electronic document which demonstrates conformity. Sucha document contains an argument structure developed in accordance with the Trust-IT methodology. Thepaper discusses details of the...
-
Exploring COVID-19 Conspiracy Theories: Education, Religiosity, Trust in Scientists, and Political Orientation in 26 European countries
PublicationThe COVID-19 virus disseminated globally at an accelerated pace, culminating in a worldwide pandemic; it engendered a proliferation of spurious information and a plethora of misinformation and conspiracy theories (CTs). While many factors contributing to the propensity for embracing conspiracy ideation have been delineated, the foremost determinant influencing individuals’ proclivity towards CT endorsement appears to be their...
-
Standard Compliance Framework for effective requirements communication
PublicationStandard Compliance Framework (SCF) is a framework, which supports application of standards at the stages of achieving, assessing and maintaining the compliance. It uses Trust Case language to develop argument structures demonstrating compliance with standards. The paper presents how SCF is applied to increase effectiveness of requirements communication. Relevant mechanisms of the framework are thoroughly described referring to...
-
The importance of trust and altruistic social orientation for COVID-19 distress
PublicationBackground: The COVID-19 pandemic, the biggest global health crisis in decades, has been a difficult experience for nations all over the world. In the present study we wanted to assess to what extent a positive attitude towards others, expressed in altruistic social orientation and a high level of trust, would be linked to lower levels of COVID-19 distress in infected and non-infected individuals. Participants and procedure:...
-
Expedited Trust-Region-Based Design Closure of Antennas by Variable-Resolution EM Simulations
PublicationThe observed growth in the complexity of modern antenna topologies fostered a widespread employment of numerical optimization methods as the primary tools for final adjustment of the system parameters. This is mainly caused by insufficiency of traditional design closure approaches, largely based on parameter sweeping. Reliable evaluation of complex antenna structures requires full-wave electromagnetic (EM) analysis. Yet, EM-driven...
-
Dual-band antenna with improved gain for WLAN and ISM applications
PublicationIn this Letter, a dual-band antenna with an improved gain is proposed. The structure features 9.7 and 10.4 dBi gain within 2.4 GHz to 2.5 GHz and 5 GHz to 6 GHz bands, respectively. This makes it suitable for WLAN and ISM applications. The structure comprises an asymmetrical pair of radiators and slots suspended over a reflector. The antenna is optimised in a two-stage process using a trust-region-based gradient search algorithm....
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies
PublicationMost experts agree that truly intelligent artificial system is yet to be developed. The main issue that still remains a challenge is imposing trust and explainability into such systems. However, is full replication of human intelligence really desirable key aim in intelligence related technology and research? This is where the concept of augmented intelligence comes into play. It is an alternative conceptualization of artificial...
-
Molecular dynamics and verisimilitude - to what extent can one trust a computational simulation?
PublicationFor the last several tens of years, computer simulations have become of undeniable importance. Molecular Dynamics (MD) simulation techniques are used to examine the phenomena which occur at the level that cannot be observed directly. Thus, they can be successfully exploited in many different scientific fields such as: materials science, applied mathematics and theoretical physics, biochemistry, biophysics or drug design. Despite...
-
Using argument structures to create a measurement plan
PublicationWhile planning an experiment the same question always arises: What are the goals of the experiment and which measurements are needed to demonstrate that the goals have been achieved? Deciding about the extent of raw data to be collected, the metrics to be constructed on those data and the interpretation of the metrics with respect to the assumed goals is by no means a trivial task. In this paper we show how a well known Gal-Question-Metrics...
-
Fast EM-driven size reduction of antenna structures by means of adjoint sensitivities and trust regions
PublicationIn this letter, a simple yet robust and computationally efficient optimization technique for explicit size reduction of antenna structures is presented. Our approach directly handles the antenna size as the main design objective, while ensuring satisfactory electrical performance by means of suitably defined penalty functions. For the sake of accuracy, the antenna structure is evaluated using high-fidelity EM simulation. In order...
-
Trust Case: justifying trust in an IT solution
PublicationW artykule prezentujemy podejście wykorzystane przy budowie dowodu zaufania (ang. trust case) do DRIVE, infrastruktury informatycznej wspomagającej dystrybucję i podawanie leków. Cele DRIVE obejmowały bezpieczniejszą i mniej kosztowną dystrybucję leków. Dowód zaufania reprezentuje argumentację przemawiającą za tym, że DRIVE jest godne zaufania. Składa się on z żądań (ang. claims) postulujących pewne związane z zaufaniem własności...
-
To i-vote or not to i-vote: Drivers and barriers to the implementation of internet voting
PublicationThis paper investigates the drivers and barriers of internet voting and the implications of a global pandemic for the development of the respective technology. In contrast to the expected uptake in the early 2000s of internet voting, the technology is still rather seldomly used in election systems around the world. The paper at hand explores the different forces that drive or impede internet voting adoption from a political, social,...
-
Miniaturization-Oriented Design of Spline-Parameterized UWB Antenna for In-Door Positioning Applications
PublicationDesign of ultra-wideband antennas for in-door localization applications is a challenging task. It involves development of geometry that maintains appropriate balance between the size and performance. In this work, a topologically-flexible monopole has been generated using a stratified framework which embeds a gradient-based trust-region (TR) optimization algorithm in a meta-loop that gradually increases the structure dimensionality....
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Low-fidelity model considerations for simulation-based optimisation of miniaturised wideband antennas
PublicationHere, variable-fidelity electromagnetic (EM)-based design optimisation of miniaturised antennas is discussed. The authors focus on an appropriate selection of discretisation density of the low-fidelity EM model, which results in good performance of the optimisation algorithm in terms of its computational complexity and reliability. Trust-region gradient search with low-fidelity model corrected by means of non-linear frequency scaling...
-
On low-fidelity models for variable-fidelity simulation-driven design optimization of compact wideband antennas
PublicationThe paper addresses simulation-driven design optimization of compact antennas involving variable-fidelity electromagnetic (EM) simulation models. Comprehensive investigations are carried out concerning selection of the coarse model discretization density. The effects of the low-fidelity model setup on the reliability and computational complexity of the optimization process are determined using a benchmark set of three ultra-wideband...
-
Reduced-cost constrained miniaturization of wideband antennas using improved trust-region gradient search with repair step
PublicationIn the letter, an improved algorithm for electromagnetic (EM)-driven size reduction of wideband antennas is proposed. Our methodology utilizes variable-fidelity EM simulation models, auxiliary polynomial regression surrogates, as well as multi-point response correction. The constraint handling is implicit, using penalty functions. The core optimization algorithm is a trust-region gradient search with a repair step added in order...
-
How do personality traits influence Open Government Data (OGD) adoption and usage? Investigating the indirect and moderating effects
PublicationOpen Government Data (OGD) research has focused for a long on the adoption and usage from the perspectives of users across different contexts. The underlying rationale for this specific focus is that OGD initiatives are undertaken to further citizen engagement with OGD for value generation and innovation purposes. Conceding that usage propensity is different across individuals, it is important to understand the influence of personality...
-
Framework for Integration Decentralized and Untrusted Multi-vendor IoMT Environments
PublicationLack of standardization is highly visible while we use historical data sets or compare our model with others that use IoMT devices from different vendors. The problem also concerns the trust in highly decentralized and anonymous environments where sensitive data are transferred through the Internet and then are analyzed by third-party companies. In our research we propose a standard that has been implemented in the form of framework...
-
Extending GQM by argument structures
PublicationEffective metrics definition methods are of particular importance, as measurement mechanisms are indispensable in virtually any engineering discipline. The paper describes how the well known Goal-Question-Metric (GQM) method of systematic metrics derivation from measurement goals can be extended by applying argument structures. The proposed approach is called Goal-Argument-Metric (GAM). We briefly introduce general ideas of GQM...