Wyniki wyszukiwania dla: TRUST CASES - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: TRUST CASES

Wyniki wyszukiwania dla: TRUST CASES

  • Trust-IT - a framework for trust cases

    Publikacja

    - Rok 2007

    Artykul prezentuje wyniki uzyskane w ramach prac zmierzających do wytworzenia zintegrowanego srodowiska wspomagającego analizę zaufania do systemów i infrastruktur informatycznych. Elementy tego środowiska obejmują język i metodykę trorzenia i pielęgnacji dowodów zaufania (ang. trust case), mtode integrowania z nimi materiału dowodowego, narzędzia wspomagajace zarządzanie dowodami zaufania oraz scenariusze ich wykorzystania w różnych...

  • An approach to evaluation of arguments in trust cases

    Publikacja

    - Rok 2008

    Trustworthiness of IT systems can be justified using the concept of a trust case. A trust case is an argument structure which encompasses justification and evidence supporting claimed properties of a system. It represents explicitly an expert's way of assessing that a certain object has certain properties. Trust cases can be developed collaboratively on the basis of evidence and justification of varying quality. They can be complex...

  • Representing and appraising Toulmin model arguments in trust cases

    The paper presents a Toulmin-based argument model used in trust cases, which allows to argue various properties of IT systems. Argument patterns encountered in trust cases are discussed together with some real-life examples. A method of argument appraisal is introduced together with the corresponding aggregation mechanism. Practical applications of trust cases in industrial and research projects are outlined.

    Pełny tekst do pobrania w portalu

  • Supporting Compliance with Security Standards by Trust Case Templates

    Publikacja

    - Rok 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • Comparative conformance cases for monitoring multiple implementations of critical requirements

    Publikacja

    The paper presents the concept and the mechanism of comparative conformance cases which support conformance monitoring in situations where a standard or other set of requirements are being implemented at multiple sites. The mechanism is enabled by NOR-STA services which implement the TRUST-IT methodology and are deployed in the cloud in accordance with the SaaS model. In the paper we introduce the concept of comparative conformance...

    Pełny tekst do pobrania w portalu

  • The KLC Cultures, Tacit Knowledge, and Trust Contribution to Organizational Intelligence Activation

    Publikacja

    - Rok 2023

    In this paper, the authors address a new approach to three organizational, functional cultures: knowledge culture, learning culture, and collaboration culture, named together the KLC cultures. Authors claim that the KLC approach in knowledge-driven organizations must be designed and nourished to leverage knowledge and intellectual capital. It is suggested that they are necessary for simultaneous implementation because no one of...

    Pełny tekst do pobrania w portalu

  • Design centering of compact microwave components using response features and trust regions

    Publikacja

    Fabrication tolerances, as well as uncertainties of other kinds, e.g., concerning material parameters or operating conditions, are detrimental to the performance of microwave circuits. Mitigating their impact requires accounting for possible parameter deviations already at the design stage. This involves optimization of appropriately defined statistical figures of merit such as yield. Alt-hough important, robust (or tolerance-aware)...

    Pełny tekst do pobrania w portalu

  • Approach to security assessment of critical infrastructures' information systems

    Publikacja

    - IET Information Security - Rok 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • EM-driven topology evolution for bandwidth enhancement of hybrid quadrature patch couplers

    Publikacja

    A broad operational bandwidth is one of the key performance figures of hybrid patch couplers. Due to the lack of systematic design procedures, bandwidth enhancement is normally obtained through manual modifications of the structure geometry. In this work, an optimization-based topology evolution for EM-driven design of patch couplers with enhanced bandwidth has been proposed. The method exploits a novel spline-based EM model where...

    Pełny tekst do pobrania w portalu

  • Reduced-Cost Design Optimization of High-Frequency Structures Using Adaptive Jacobian Updates

    Publikacja

    - Rok 2019

    Electromagnetic (EM) analysis is the primary tool utilized in the design of high-frequency structures. In vast majority of cases, simpler models (e.g., equivalent networks or analytical ones) are either not available or lack accuracy: they can only be used to yield initial designs that need to be further tuned. Consequently, EM-driven adjustment of geometry and/or material parameters of microwave and antenna components is a necessary...

    Pełny tekst do pobrania w portalu

  • Quasi-Global Optimization of Antenna Structures Using Principal Components and Affine Subspace-Spanned Surrogates

    Publikacja

    Parametric optimization is a mandatory step in the design of contemporary antenna structures. Conceptual development can only provide rough initial designs that have to be further tuned, often extensively. Given the topological complexity of modern antennas, the design closure necessarily involves full-wave electromagnetic (EM) simulations and—in many cases—global search procedures. Both factors make antenna optimization a computationally...

    Pełny tekst do pobrania w portalu

  • Expedited antenna optimization with numerical derivatives and gradient change tracking

    Design automation has been playing an increasing role in the development of novel antenna structures for various applications. One of its aspects is electromagnetic (EM)-driven design closure, typically applied upon establishing the antenna topology, and aiming at adjustment of geometry parameters to boost the performance figures as much as possible. Parametric optimization is often realized using local methods given usually reasonable...

    Pełny tekst do pobrania w portalu

  • Expedited Globalized Antenna Optimization by Principal Components and Variable-Fidelity EM Simulations: Application to Microstrip Antenna Design

    Publikacja

    Parameter optimization, also referred to as design closure, is imperative in the development of modern antennas. Theoretical considerations along with rough dimension adjustment through supervised parameter sweeping can only yield initial designs that need to be further tuned to boost the antenna performance. The major challenges include handling of multi-dimensional parameter spaces while accounting for several objectives and...

    Pełny tekst do pobrania w portalu

  • Nonlinear material identification of heterogeneous isogeometric Kirchhoff–Love shells

    This work presents a Finite Element Model Updating inverse methodology for reconstructing heterogeneous materialdistributions based on an efficient isogeometric shell formulation. It uses nonlinear hyperelastic material models suitable fordescribing incompressible material behavior as well as initially curved shells. The material distribution is discretized by bilinearelements such that the nodal values...

    Pełny tekst do pobrania w portalu

  • Rapid Antenna Optimization with Restricted Sensitivity Updates by Automated Dominant Direction Identification

    Meticulous tuning of geometry parameters turns pivotal in improving performance of antenna systems. It is more and more often realized using formal optimization methods, which is demonstrably the most efficient way of handling multiple design variables, objectives, and constraints. Although in some cases a need for launching global search arises, a typical design scenario only requires local optimization, especially when a decent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Trust triggers and barriers in intercultural teams

    Intercultural teams are more and more popular nowadays — they constitute a serious challenge in terms of effective cooperation and trust building, however. The article presents the potential problems that can affect intercultural cooperation and stresses the power of trust in cultural diversity conditions. The ten-factor model of intercultural team trust is presented. The main aim was to answer the questions: what are the differences...

    Pełny tekst do pobrania w portalu

  • Trust case - a case for trustworthiness of IT infrastructures

    Publikacja

    - Rok 2005

    Artykuł prezentuje podejście do budowy argumentów (trust case) uzasadniających zaufanie do systemów i infrastruktur IT. Wprowadza system pojęć związanych ze strukturą i treścią trust case, identyfikuje udziałowców trust case oraz dyskutuje możliwość wsparcia narzędziowego procesu zarządzanie trust case. Omawia równiez krótko dotychczasowe zastosowania tego podejścia.

  • Trust in Electronic Word-of-Mouth (eWOM): the concept and the most important determinants

    Publikacja

    - Rok 2022

    eWOM and trust in it is now the most important factor in determining buyers' purchasing behavior. Familiarity with the determinants of trust establishes the formation of appropriate marketing activities. However, the growing number of new forms of eWOM and its increasingly complex and multidimensional nature have created a lot of confusion. The article aims to organize the concepts related to trust in eWOM, to indicate the most...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection

    Publikacja

    - Rok 2016

    We propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dis/Trust and data-driven technologies

    Publikacja

    - Internet Policy Review - Rok 2023

    This concept paper contextualises, defines, and systematises the concepts of trust and distrust (and their interrelations), providing a critical review of existing literature so as to identify gaps, disjuncture, and continuities in the use of these concepts across the social sciences and in the context of the consolidation of the digital society. Firstly, the development of the concept of trust is explored by looking at its use...

    Pełny tekst do pobrania w portalu

  • Implementing decisional trust: a first approach for smart reliable systems

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2009

    In this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • User Trust Levels and Their Impact on System Security and Usability

    A multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.

    Pełny tekst do pobrania w portalu

  • Supporting compliance with safety standards by trust case templates

    Publikacja

    - Rok 2007

    Standard Compliance (SC) Framework presented in this paper encompasses methods and tools which provide support for application of standards. The framework is based on trust case methodology. A trust case is a data structure which represents a justification that an object (a system, an infrastructure, an organization) exhibits certain properties. It contains an argument and related evidence which support claimed properties. A trust...

  • How can we justify trust in software based systems?

    Publikacja

    - Rok 2005

    Artykuł wprowadza pojęcie ''trust case'' i wyjasnia jego znaczenie w kontekście systemów informatycznych. Przedstawia również doświadczenia zdobyte w trakcie budowy trust case dla złożonego systemu IT przeznaczonego do wspomagania procesów dystrybucji i stosowania leków. Przedstawia również szereg otwartych problemów badawczych dotyczacych budowy i zarządzanie dowodami zaufania (trust case).

  • Belief in the importance of socially responsible behaviors – the significance of trust and personal experiences with COVID-19

    Publikacja

    - CURRENT PSYCHOLOGY - Rok 2022

    A vast number of studies have shown that trust is related to socially desirable traits and behaviors. In the present research we have investigated the relationship between generalized trust and beliefs about the importance of socially responsible behaviors (SRB) during the pandemic – namely, following the sanitary regime and getting vaccinated. Basing on the previous findings we assumed that trustful people...

  • An Approach to Trust Case Development

    Publikacja

    In the paper we present an approach to the architectural trust case development for DRIVE, the IT infrastructure supporting the processes of drugs distribution and application. The objectives of DRIVE included safer and cheaper drugs distribution and application. A trust case represents an argument supporting the trustworthiness of the system. It is decomposed into claims that postulate some trust related properties. Claims differ...

    Pełny tekst do pobrania w portalu

  • Collaborative approach to trustworthiness of it infrastructures

    Publikacja

    - Rok 2005

    Artykuł wprowadza koncepcję ''trust case'' i wyjaśnia jak jest ona używana w celu uzasadnienia zaufania do systemów i infrastruktur IT. W szczególności skoncentrowano się na procesie budowy trust case, wyjasniono jego strukturę oraz podkreślono konieczność włączenia do procesu właściwych udziałowców. Załączono również informację na temat funkcjonalnej struktury narzedzi wspomagających zarządzanie trust case w ramach jego cyklu...

  • Relationships between Trust and Collaborative Culture in The Context of Tacit Knowledge Sharing

    The literature review presents a lot of theoretical and empirical evidence that Trust affects Collaborative Culture. The opposite also proves to be true: Collaborative Culture influences Trust. The main hypothesis presented in this paper says that both these factors are strongly correlated and modify each other. This study examines the mutual relationship of the said variables in the context of Tacit Knowledge Sharing based on...

    Pełny tekst do pobrania w portalu

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Impact of Usability Website Attributes on Users’ Trust, Satisfaction and Loyalty

    This paper presents the results of an experimental study aimed at identifying possible relationships among website usability characteristics, consumer satisfaction, trust and loyalty. These factors regard not only customer satisfaction in a transactional sense, but in the long term they may affect e-customer behavior, opinions, recommendations and attitudes toward using on-line services in general. The study was performed with...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Clustering Context Items into User Trust Levels

    An innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....

    Pełny tekst do pobrania w portalu

  • Argument strategies and patterns of the Trust-IT framework

    Artykuł dotyczy metodologicznego i narzędziowego środowiska Trust-IT wspierającego budowę dowodów zaufania (ang. trust case), a w szczególności strategii tworzenia dowodu zaufania. Strategia uzależniona jest od właściwości systemu (lub innego rozważanego obiektu), która podlega analizie w ramach dowodu zaufania. W artykule zaprezentowano dwie strategie: oparta na ryzyku i oparta na standardach oraz omówiono kilka często stosowanych...

  • Using evidence based arguments to support trust

    Publikacja

    - Rok 2013

    Wprowadzono podstawowe koncepcje metodyki TRUST-IT: argumentu i dowodu, modelu argumentacji, szablonu argumentacji, oceny argumentu oraz kontekstu aplikacyjnego. Przedstawiono zakres funkcjonalności, modele udostepniania oraz politykę bezpieczeństwa informacji związane z usługami NOR-STA wspomagającymi zastosowania metodyki TRUST-IT. Przedstawiono również dotychczasowe doświadczenia związane z wdrażaniam uzług NOR-STA w różnych...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Trust and Distrust in e-Democracy

    Publikacja

    - Rok 2022

    In the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of distrust is almost neglected in such literature but,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network

    The capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...

    Pełny tekst do pobrania w portalu

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publikacja

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Pełny tekst do pobrania w portalu

  • Praca z normą Common Criteria wspomagana szablonami Trust Case

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Metoda jest przedmiotem intensywnych badań. Jeden z kierunków rozwoju dotyczy tworzenia szablonów oceny zgodności ze standardami. Szablon Trust Case jest odwzorowaniem wymagań zawartych w normie w strukturę drzewa dowodowego....

  • Trust, Collaborative Culture and Tacit Knowledge Sharing in Project Management–a Relationship Model

    Publikacja

    The aim of this research is to study the relationship between Trust, Collaborative Culture, and Tacit Knowledge Sharing in Project Management as a source of Team Creativity in the context of delivering value through knowledge. For this purpose authors conducted a study of 514 Polish professionals with different functions and experience in managing projects in construction industry. The data collected during the study has been analysed...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Trust and Distrust in e-Democracy

    Publikacja

    - Rok 2022

    In the digital government research literature, the concept of trust is typically used as a precondition for the adoption of digital technology in the public sector or an outcome of a roadmap leading up to such adoption. The concept plays a central role in many decisions linked to the planning, adoption and management of the public sector technology. In contrast, the concept of...

    Pełny tekst do pobrania w portalu

  • Supporting Assurance by Evidence-based Argument Services

    Structured arguments based on evidence are used in many domains, including systems engineering, quality assurance and standards conformance. Development, maintenance and assessment of such arguments is addressed by TRUST-IT methodology outlined in this paper. The effective usage of TRUST-IT requires an adequate tool support. We present a platform of software services, called NOR-STA, available in the Internet, supporting key activities...

    Pełny tekst do pobrania w portalu

  • Building Confidence and Trust in Ireland's National Maternity Services Workforce –What matters most and how?

    Publikacja
    • A. Ojo
    • N. Rizun
    • G. S. Grace
    • W. Przychodzen
    • M. Isazad Mashinchi
    • C. Foley
    • D. Rohde

    - HEALTH POLICY - Rok 2023

    National surveys on care experiences are increasingly adopted as regulatory mechanisms for improving care quality and increasing public trust in healthcare services. Based on data collected as part of Ireland's 2020 National Maternity Experience Survey, this study investigates care-related factors that contribute most to confidence and trust in the professional workforce (or carers) within Irish maternity services. The survey covered...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The effects of perceived risk, brand value, and brand trust on eWOM

    Publikacja

    Unrestricted access to the Internet, mobile devices, social applications and offering shopping comment options via online stores and platforms, encourages customers to generate online reviews about brands. That is why it became important to learn about the factors that motivate customers to create electronic word of mouth (eWOM). The survey aimed to check if there are links between perceived brand value, perceived risk, brand trust...

    Pełny tekst do pobrania w portalu

  • Zastosowanie szablonów Trust Case w pracy z normą BS 7799

    Publikacja

    - Rok 2006

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...

  • A theoretical framework for understanding trust and distrust in internet voting

    Publikacja

    - Rok 2022

    Each and every case of success and failure in the implementation of internet voting is permeated by a common element: the concept of trust. Several researchers highlighted the relevance of creating trust for the successful implementation of technology [15] and, in particular, of internet voting [13]. But the concept itself is complex and challenging to define, for one fundamental reason: it is a concept of everyday social use...

    Pełny tekst do pobrania w portalu

  • Practical Evaluation of Internet Systems' Security Mechanisms

    A proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.

    Pełny tekst do pobrania w portalu

  • Trust Management Method for Wireless Sensor Networks

    Publikacja

    - Rok 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Pełny tekst do pobrania w portalu

  • Do personality traits influence the user’s behavioral intention to adopt and use Open Government Data (OGD)? An empirical investigation

    Publikacja
    • N. Rizun
    • C. H. Alexopoulos
    • S. Saxena
    • F. Kleiman
    • R. Matheus

    - TELEMATICS AND INFORMATICS - Rok 2024

    The academic interest in the Open Government Data (OGD) domain has been burgeoning over the years. Conceding that the prime focus of an OGD initiative is its further re-use for value creation and innovation by stakeholders, the present study seeks to underscore the role of HEXACO personality traits on behavioral intention (BI) to adopt and use OGD in developing countries' context. We investigate the direct, indirect, and moderating...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Expedited Design Closure of Antennas By Means Of Trust-Region-Based Adaptive Response Scaling

    In the letter, a reliable procedure for expedited design optimization of antenna structures by means of trust-region adaptive response scaling (TR-ARS) is proposed. The presented approach exploits two-level electromagnetic (EM) simulation models. A predicted high-fidelity model response is obtained by applying nonlinear frequency and amplitude correction to the low-fidelity model. The surrogate created this way is iteratively rebuilt...

    Pełny tekst do pobrania w portalu

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publikacja

    - Rok 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Pełny tekst do pobrania w portalu

  • Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks

    Publikacja

    - SENSORS - Rok 2020

    The aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...

    Pełny tekst do pobrania w portalu