Formalizing and Managing Activity-Aware Trust in Collaborative Environments

Author(s):  
Ioanna Dionysiou ◽  
David E. Bakken

Trust is an abstraction of individual beliefs that an entity has for specific situations and interactions. An entity’s beliefs are not static but they change as time progresses and new information is processed into knowledge. Trust must evolve in a consistent manner so that it still abstracts the entity’s beliefs accurately. In this way, an entity continuously makes informed decisions based on its current beliefs. This chapter presents and discusses a conceptual trust framework that models an entity’s trust as a relation whose state gets updated as relevant conditions that affect trust change. The model allows entities to reason about the specification and adaptation of trust that is placed in an entity. An intuitive and practical approach is proposed to manage end-to-end trust assessment for a particular activity, where multiple trust relationships are examined in a bottom-up evaluation manner to derive the overall trust for the activity.

Author(s):  
Ioanna Dionysiou ◽  
David E. Bakken

Trust is an abstraction of individual beliefs that an entity has for specific situations and interactions and it must evolve in a consistent manner so that it still abstracts the entity’s beliefs accurately. This paper presents and discusses a conceptual trust framework that models an entity’s trust as a relation whose state gets updated as relevant conditions that affect trust change. The proposed model allows entities to reason about the specification and adaptation of trust that is placed in an entity. An intuitive and practical approach is presented to manage end-to-end trust assessment for a particular activity, where multiple trust relationships are examined in a bottom-up evaluation manner to derive the overall trust for the activity. Finally, Hestia, a novel trust management system that conforms to the formal model’s principles, is described.


2021 ◽  
pp. 314-323
Author(s):  
Dragan Simić ◽  
José Luis Calvo-Rolle ◽  
José R. Villar ◽  
Vladimir Ilin ◽  
Svetislav D. Simić ◽  
...  

2019 ◽  
pp. 63-68

Modelo Sip Seguro para una Comunicación extremo a extremo sobre IPV6 Sip Security Model for End to End Communication on IPv6 Ross M. Benites, José L Quiroz, Raúl Villafani INICTEL-UNI, Lima 41 DOI: https://doi.org/10.33017/RevECIPeru2011.0024/ RESUMEN Las implementaciones VoIP hoy en día se han incrementado considerablemente, sin embargo no entodos los escenarios se tiene en cuenta los mecanismos de seguridad adecuados. Este último punto es muy importante a considerar el día de hoy , sobre todo por el agotamiento de las direcciones IPV4 y el despliegue hacia IPV6 de muchos de los servicios, donde aparecerán nuevas amenazas a la seguridad que trataran de opacar el gran auge de la tecnología VoIP. Si bien IPv6 fue desarrollado para solucionar muchas vulnerabilidades en seguridad que actualmente se ven presentes en IPv4, el hecho es que no logra alcanzar aún estas metas según pruebas realizadas. El protocolo SIP, el actor principal de la tecnología VoIP , requiere de la implementación de mecanismos de seguridad . Los escenarios actuales requieren terminales de usuario de alto rendimiento y soporte para adaptarse a mecanismos de seguridad heterogéneos o asumir relaciones de confianza. Sin embargo debemos tener en cuenta que hay varias combinaciones de soluciones de seguridad que son proporcionados por usuarios finales y los servidores. En este trabajo se expone un modelo de seguridad aplicado a un escenario experimental VoIP sobre el Internet de Próxima Generación (IPv6), que utiliza la seguridad salto a salto y extremo a extremo. El escenario propuesto se encuentra sobre una red local con direcciones IPv6. Utiliza dos servidores Asterisk implementados bajo las mismas características que cumplen la función de SIP Proxy, y se encuentran conectados mediante un enlace troncal SIP – TLS. Se utilizan además dos terminales de usuario (teléfonos IP) provenientes de una marca comercial conocida, registrados cada uno mediante el protocolo SIP-TLS a cada servidor Asterisk. En trabajos anteriores, se han realizado varios estudios sobre el rendimiento del uso de VoIP sobre IPv4 e IPv6 comparando los resultados [1], evaluación de mecanismos de seguridad para mantener la autenticación de usuario, confidencialidad e integridad de la señalización y media de los mensajes VoIP sobre las redes IPv4 [2] y [3]. Este trabajo se esboza en un marco de seguridad, donde se presenta un escenario basado en una red VoIP en IPV6 utilizando TLS y SRTP. TLS es utilizado para la seguridad en el establecimiento de la sesión con mecanismos de autenticación salto a salto y SRTP (Secure Real Time Protocol) para la seguridad del establecimiento del stream de media. Nos enfocaremos en analizar y evaluar la seguridad de los mensajes en este escenario sobre el protocolo de transporte seguro (TLS). Descriptores: sip, tls ,ipv6, srtp. ABSTRACT VoIP deployments today have increased considerably, but not all the scenarios consider appropriate security mechanisms. This last point is very important to consider today, especially the depletion of IPv4 addresses and the deployment of many services IPv6, where will new security threats to try to overshadow the great technology boom VoIP. Although IPv6 was developed to solve many security vulnerabilities are currently present in IPv4, the fact is that still fails to achieve these goals by testing. The SIP protocol, the main actor of VoIP technology requires the implementation of security mechanisms. The current scenarios require high-end user performance and support to adapt to heterogeneous security mechanisms or assume trust relationships. But keep in mind that there are various combinations of security solutions that are provided by end users and servers. This paper presents a security model applied to an experimental scenario VoIP over Next Generation Internet (IPv6), which uses hop by hop security and end to end. The proposed scenario is on a local network with IPv6 addresses. Use two Asterisk servers implemented under the same characteristics that act as SIP Proxy, and are connected via SIP trunk - TLS. They also use two user terminals (IP phones) from a known trade mark registered by each SIP-TLS protocol for each server Asterisk. In previous work, there have been several studies on the performance of VoIP using IPv6 and IPv4 and comparing the results [1], evaluation of security mechanisms to support user authentication, confidentiality and integrity of the signaling and media messages VoIP over IPv4 networks [2] and [3]. This paper outlines a framework of security, which presents a scenario based on a VoIP network in IPv6 using TLS and SRTP. TLS is used for the security session establishment authentication mechanisms hop by hop and SRTP (Secure Real Time Protocol) for the safety of the establishment of media stream. We will focus on analyzing and evaluating the security of the messages in this scenario the secure transport protocol (TLS) . Keywords: sip, tls ,ipv6, srtp.


2011 ◽  
Vol 7 (2) ◽  
pp. 192
Author(s):  
Jeffrey Sultanof

In 2002 the author published <span style="font-family: mceinline;"><em>Birth of the Cool</em>, </span>a folio of the Miles Davis nonet repertoire of 1948 to 1950, based on the original manuscripts. This article gives a brief history of the nonet and its music; describes how the manuscripts turned up and how the folio came to be published; presents listings of the most salient editorial changes made to the parts in preparing the folio, as well as corrections that should be made to the folio; and shares new information about this repertoire that has come to light since the folio's publication. Finally, the article presents the author's philosophical and practical approach to preparing accurate versions of jazz and popular ensemble music.


Author(s):  
M. J. Hall ◽  
Laleh Patel

This chapter discusses the importance of collaboration as a skill for leadership in an age of technology disruptions. It introduces a community-based framework for creating collaborative environments that has applications for a variety of contexts. The framework includes the following elements: a common goal related to a mutual work challenge or interest; a collaborative co-design mindset where participants cooperatively work together to gain new information and insights; a network of people connected in ways that build relationships based on shared needs and experiences; a structured, guided process to ensure a disciplined game plan; a variety of tools, techniques, and methods from various disciplines including such as and Design Thinking to enable a disciplined yet flexible approach for finding solutions; a technology-based platform for knowledge management and communications; and an intentional focus on learning. To make the framework realistic, the chapter provides examples for each component from a professional consortium for senior talent development professionals, the Association for Talent Development ATD Forum. These examples are from the forum’s interactive semiannual labs, a primary method for members to build relationships by connecting, collaborating, learning/sharing with each other in an experimental lab environment. The labs reflect the forum’s focus on performance and learning as a journey and the penchant for evidence-based research. It is a venue to gain insights on current topics, to practice using collaborative tools, and to benchmark other members. Labs enable participants to use the learning in their own practices and to share what they do via a webcast.


Asian Survey ◽  
2020 ◽  
Vol 60 (2) ◽  
pp. 391-415
Author(s):  
Thomas Heberer ◽  
Anna Shpakovskaya

In this article, we join an ongoing debate among Western scholars on political representation and argue that political representation is undergoing a transformation stimulated by the rapid proliferation of the new information and communication technologies. We propose that in China, the new social media have stimulated a shift from representation by official organizations to bottom-up self-representation, and from mandate political representation to embodiment. To grasp this change, we select private entrepreneurs as our focus of study and propose the concept of “connective representation.” Drawing on fieldwork in China from 2015 through 2019 and on analysis of online materials, we demonstrate how private entrepreneurs in China form and advance their collective interests through online connectivity. The concept of connective representation adds to the conventional perspectives on political representation, particularly in the authoritarian setting.


2016 ◽  
Vol 17 (6) ◽  
pp. 2240-2247 ◽  
Author(s):  
Han Yang ◽  
Theo G. M. van de Ven
Keyword(s):  

2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Marisa Casillas ◽  
Alejandrina Cristia

Recent years have seen rapid technological development of devices that can record communicative behavior as participants go about daily life. This paper is intended as an end-to-end methodological guidebook for potential users of these technologies, including researchers who want to study children’s or adults’ communicative behavior in everyday contexts. We explain how long-format speech environment (LFSE) recordings provide a unique view on language use and how they can be used to complement other measures at the individual and group level. We aim to help potential users of these technologies make informed decisions regarding research design, hardware, software, and archiving. We also provide information regarding ethics and implementation, issues that are difficult to navigate for those new to this technology, and on which little or no resources are available. This guidebook offers a concise summary of information for new users and points to sources of more detailed information for more advanced users. Links to discussion groups and community-augmented databases are also provided to help readers stay up-to-date on the latest developments.


1962 ◽  
Vol 2 (3) ◽  
pp. 175-177 ◽  
Author(s):  
W. A. Wilkinson ◽  
W. H. Waldo

Sign in / Sign up

Export Citation Format

Share Document