Trust Management Tools

2011 ◽  
pp. 198-216 ◽  
Author(s):  
Tyrone Grandison

After entering the realm of computing over a decade ago, the term trust management has evolved to encompass many concepts and mechanisms that bring it closer to its intuitive interpretation. This chapter will outline the evolution and present the catalyst(s) for each phase in its metamorphosis. In each stage, trust management tools were constructed to showcase the current understanding in the field. These tools will be discussed and their strengths, domains of application, and scope for improvement presented. The foundation of trust management technology can be found in security notions, for example credentials, in mathematical computation and in formal (and informal) reputation models. Each of these categories and their hybrids will be highlighted. This chapter should leave the reader with (1) a holistic view of the trust management problem, (2) a clear differentiation of trust management from other fields (and terms) in the computer security arena, and (3) knowledge of the appropriate domain of usage for each system.

2019 ◽  
Vol 109 (01-02) ◽  
pp. 72-80
Author(s):  
M. Weber ◽  
M. Helfert ◽  
F. Unterderweide ◽  
E. Abele ◽  
M. Weigold

Im Rahmen des vom Bundesministerium für Wirtschaft und Energie (BMWi) geförderten Projekts „ETA-Fabrik“ am Institut für Produktionsmanagement, Technologie und Werkzeugmaschinen (PTW) der Technischen Universität Darmstadt konnte die Energieeffizienz von Motorspindeln als Hauptenergieverbraucher von Werkzeugmaschinen durch Einsatz der Synchronreluktanztechnologie gesteigert werden. In der Konsequenz ergeben sich weitere Energieeinsparpotenziale und produktionstechnische Vorteile durch eine gesamtenergetische Betrachtung der Werkzeugmaschine mit Kühlsystem und intelligentem Spindelthermomanagement.   As part of the ‘ETA-Fabrik’ project funded by the BMWi, the Institute of Production Management, Technology and Machine Tools (PTW) of the TU Darmstadt has used synchronous reluctance drives to increase the energy efficiency of motor spindles as main energy consumers of machine tools. Subsequently, new opportunities for energy savings and advantages for the manufacturing process arise by taking a holistic view on machine tools including the cooling system, proposing an intelligent spindle thermal management.


Symposion ◽  
2021 ◽  
Vol 8 (1) ◽  
pp. 79-88
Author(s):  
Samson Liberman ◽  

The aim of this paper is a socio-philosophical analysis of attention deficit phenomenon, which is being detected at the intersection of several subject areas (psychiatry, theory of journalism, economics). The main methodological instrument of the study is a Marxist principle of alienation. Alienation of attention, which, on the one hand, is being understood as a process of producing attention as a commodity, and on the other one – as the process of producing a person as a user of the platform, provides the methodological basis, necessary for a holistic view of the phenomenon. The main differences of attention alienation from alienation of labor and desire are considered within the paper. The possibility of a modern form of alienation is associated primarily with the emergence of the new forms of capital – platforms, providing infrastructure for the interaction of other users and aimed at collection and procession of large amounts of data. The main aspects of attention management: game, content sharing and design have been distinguished within the paper. The main consequences of alienation of attention for the structure of the individual and society have been spelled out. The effects of the spread of gaming techniques of attention management and content distribution techniques specific to social networks have been considered. It being is suggested that there is a correlation between the spread of ADHD diagnosis and the spread of attention management technologies, and, as well, between the distribution of attention management technology and the ‘renaissance’ of social in the social theory.


2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Weidong Fang ◽  
Wuxiong Zhang ◽  
Wei Chen ◽  
Tao Pan ◽  
Yepeng Ni ◽  
...  

As a key component of the information sensing and aggregating for big data, cloud computing, and Internet of Things (IoT), the information security in wireless sensor network (WSN) is critical. Due to constrained resources of sensor node, WSN is becoming a vulnerable target to many security attacks. Compared to external attacks, it is more difficult to defend against internal attacks. The former can be defended by using encryption and authentication schemes. However, this is invalid for the latter, which can obtain all keys of the network. The studies have proved that the trust management technology is one of effective approaches for detecting and defending against internal attacks. Hence, it is necessary to investigate and review the attack and defense with trust management. In this paper, the state-of-the-art trust management schemes are deeply investigated for WSN. Moreover, their advantages and disadvantages are symmetrically compared and analyzed in defending against internal attacks. The future directions of trust management are further provided. Finally, the conclusions and prospects are given.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nigel P. Grigg

PurposeThe purpose of this paper is to present a literature review demonstrating that quality and its management are increasingly definable as a balancing act between value, risk and cost throughout the value stream, from product/service design to production and delivery, and purchaser decision-making. An original framework is presented showing this interplay across the value stream, referred to as the QVRC framework.Design/methodology/approachContent analysis is combined with bibliometric analytics, displayed via temporal graphs and citation networks. Reviewed literature is transdisciplinary, encompassing marketing, operations/quality and psychology sources. Core quality management methodologies are positioned on the framework illustrating their relative contribution to value, risk and cost management.FindingsThe QVRC framework is developed, and used as a basis for classifying models and methodologies associated with quality management. A set of propositions are developed, which, together with the framework, set an agenda for further research.Research limitations/implicationsNo literature review can capture the richness of discourses on terms as pervasive as value, risk and cost. This paper aims to present a systematic and reliable sampling of such literature.Practical implicationsThe resulting model can be applied to management tools, and to products and services.Originality/valueResearchers, particularly in marketing, have developed models of value, risk and cost in terms of products and services. However, delivering products that provide the appropriate value, risk and cost trade-off is an operations management problem. This is the first paper to combine value, risk and cost across the value stream showing how this interplay extends beyond product.


Author(s):  
S Maj

The Internet is an integral part of business communications, however it was based on open standards without due regard to security issues consequently security threats are not only persistent but also increasing. The Computer Security Institute (CSI) 2007 reported a doubling of average annual loss by US companies. There are three primary network security threats: policy, technology, and configuration. This chapter is primarily concerned with the configuration and management of network devices. There are a number of different network management tools currently available, however typically it is problematic to concurrently display configuration data from devices and protocols whilst maintaining a navigational context. This chapter demonstrates how the State Model Diagram method is not only a universal model-driven network tool but also useful for the configuration and management of complex security protocols and devices.


2012 ◽  
Vol 488-489 ◽  
pp. 1163-1167
Author(s):  
Yan Ping Cong ◽  
Zhi Qiang Wei ◽  
Guang Yang

In this paper, we studied the trust management problem in one-hop cluster-based underwater wireless sensor networks (UWSNs). Trust plays an important role in constructing UWSNs. Due to the dynamic natures of UWSNs (current movement, addition or deletion of nodes) and the massive deployment of underwater sensor nodes, coupled with the short range of water acoustic communications, we need to ensure that all communicating nodes are trusted. We propose a hierarchical trust management scheme for one-hop cluster-based underwater wireless sensor networks.


2018 ◽  
Vol 30 (4) ◽  
pp. 387-412 ◽  
Author(s):  
Roque M Guitián de Frutos ◽  
Balbina Casas-Méndez

AbstractThis study considers the problem of optimizing the routes of vehicles used in an agricultural cooperative that distributes animal feed to its customers. Different peculiarities distinguish our problem from the general Vehicle Routing Problem because there exists a type of time window constraint, truck capacity is limited, trucks are compartmentalized, there are access restrictions for trucks to some farms and our problem has the main objective of maximizing the amount of feed distributed every day and an auxiliary criterion of minimizing the transport costs. We present a mathematical programming formulation of the model that represents the logistics management problem. As solving the exact model is computationally expensive, we opt for a hybrid heuristic approach that first uses an insertion heuristic algorithm to obtain an initial solution and then improvement processes are performed using the so-called simulated annealing metaheuristic. We have built a graphical interface that allows easy use of the system and, in particular, efficient post-optimality analysis. Moreover, this interface can easily interface with other management tools. The utility of our model is shown with real and simulated data sets.


2013 ◽  
Vol 62 (6) ◽  
pp. 2792-2806 ◽  
Author(s):  
Huanyu Zhao ◽  
Xin Yang ◽  
Xiaolin Li

Mobility model and network topology play important roles in mobile ad hoc networks (MANETs). Most existing trust and reputation management systems in a MANET do not address mobility issues adequately. In this paper, we study the trust management problem in a MANET with cyclic movement patterns. In a cyclic MANET (cMANET) where nodes periodically move, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggregation issues. Unlike trust management in conventional schemes, trust management in cMANET involves not only neighbor trust relationships but location and time factors as well. We model trust relations as a trust graph in cMANET to enhance accuracy and efficiency of trust establishment among nodes. Leveraging the distributed Bellman-Ford algorithm and stochastic Markov chain process for fast and lightweight aggregation of trust scores, the cTrust scheme is a decentralized and self-configurable trust aggregation scheme. To evaluate the performance, we implement the proposed cTrust scheme. We use the student contact patterns on the National University of Singapore (NUS) campus and Seattle metro bus traces as case studies for our cMANET communication model. The simulation results demonstrate the features of trust relationship dissemination in real environments and the efficiency, accuracy, scalability, and robustness of the cTrust scheme. With increasing scales of ad hoc networks and complexities of trust topologies, cTrust scales well with marginal overheads.


2017 ◽  
Vol 23 (2) ◽  
pp. 114-143 ◽  
Author(s):  
Ernnie Illyani Basri ◽  
Izatul Hamimi Abdul Razak ◽  
Hasnida Ab-Samat ◽  
Shahrul Kamaruddin

Purpose The purpose of this paper is to provide comprehensive information on preventive maintenance (PM) planning and methods used in the industry in order to achieve an effective maintenance system. Design/methodology/approach The literature review is organized in a way that provides the general overview of the researches done in the PM. This paper discusses the literatures that had been reviewed on four main topics, which are the holistic view of maintenance policies, PM planning, PM planning concept and PM planning-based in developing optimal planning in executing PM actions. Findings PM policy is one of the original proactive techniques that has been used since the start of researches on maintenance system. Review of the methods presented in this paper shows that most researches analyse effectiveness using artificial intelligence, simulation, mathematical formulation, matrix formation, critical analysis and multi-criteria method. While in practice, PM activities were either planned based on cost, time or failure. Research trends on planning and methods for PM show that the variation of approaches used over the year from early 1990s until today. Practical implications Research about PM is known to be extensively conducted and majority of companies applied the policy in their production line. However, most analysis and method suggested in published literatures were done based on mathematical computation rather than focussing on solution to real problems in the industry. This normally would lead to the problems in understanding by the practitioner. Therefore, this paper presented researches on PM planning and suggested on the methods that are practical, simple and effective for application in the real industry. Originality/value The originality of this paper comes from its detail analysis of PM planning in term of its research focus and also direction for application. Extensive reviews on the methods adopted in relation to PM planning based on the planning-based such as cost-based, time-based and failure-based were also provided.


Sign in / Sign up

Export Citation Format

Share Document