service providers
Recently Published Documents


TOTAL DOCUMENTS

13341
(FIVE YEARS 6033)

H-INDEX

77
(FIVE YEARS 14)

Author(s):  
Merrihan Badr Monir Mansour ◽  
Tamer Abdelkader ◽  
Mohammed Hashem AbdelAziz ◽  
El-Sayed Mohamed EI-Horbaty

Mobile edge computing (MEC) is a new computing paradigm that brings cloud services to the network edge. Despite its great need in terms of computational services in daily life, service users may have several concerns while selecting a suitable service provider to fulfil their computational requirements. Such concerns are: with whom they are dealing with, where will their private data migrate to, service provider processing performance quality. Therefore, this paper presents a trust evaluation scheme that evaluates the processing performance of a service provider in the MEC environment. Processing performance of service providers is evaluated in terms of average processing success rate and processing throughput, thus allocating a service provider in a relevant trust status. Service provider processing incompliance and user termination ratio are also computed during provider’s interactions with users. This is in an attempt to help future service users to be acknowledged of service provider’s past interactions prior dealing with it. Thus, eliminating the probability of existing compromised service providers and raising the security and success of future interactions between service providers and users. Simulations results show service providers processing performance degree, processing incompliance and user termination ratio. A service provider is allocated to a trust status according to the evaluated processing performance trust degree.


2022 ◽  
Vol 13 (1) ◽  
pp. 1-22
Author(s):  
Hongting Niu ◽  
Hengshu Zhu ◽  
Ying Sun ◽  
Xinjiang Lu ◽  
Jing Sun ◽  
...  

Recent years have witnessed the rapid development of car-hailing services, which provide a convenient approach for connecting passengers and local drivers using their personal vehicles. At the same time, the concern on passenger safety has gradually emerged and attracted more and more attention. While car-hailing service providers have made considerable efforts on developing real-time trajectory tracking systems and alarm mechanisms, most of them only focus on providing rescue-supporting information rather than preventing potential crimes. Recently, the newly available large-scale car-hailing order data have provided an unparalleled chance for researchers to explore the risky travel area and behavior of car-hailing services, which can be used for building an intelligent crime early warning system. To this end, in this article, we propose a Risky Area and Risky Behavior Evaluation System (RARBEs) based on the real-world car-hailing order data. In RARBEs, we first mine massive multi-source urban data and train an effective area risk prediction model, which estimates area risk at the urban block level. Then, we propose a transverse and longitudinal double detection method, which estimates behavior risk based on two aspects, including fraud trajectory recognition and fraud patterns mining. In particular, we creatively propose a bipartite graph-based algorithm to model the implicit relationship between areas and behaviors, which collaboratively adjusts area risk and behavior risk estimation based on random walk regularization. Finally, extensive experiments on multi-source real-world urban data clearly validate the effectiveness and efficiency of our system.


2022 ◽  
Vol 25 (1) ◽  
pp. 1-37
Author(s):  
Stefano Berlato ◽  
Roberto Carbone ◽  
Adam J. Lee ◽  
Silvio Ranise

To facilitate the adoption of cloud by organizations, Cryptographic Access Control (CAC) is the obvious solution to control data sharing among users while preventing partially trusted Cloud Service Providers (CSP) from accessing sensitive data. Indeed, several CAC schemes have been proposed in the literature. Despite their differences, available solutions are based on a common set of entities—e.g., a data storage service or a proxy mediating the access of users to encrypted data—that operate in different (security) domains—e.g., on-premise or the CSP. However, the majority of these CAC schemes assumes a fixed assignment of entities to domains; this has security and usability implications that are not made explicit and can make inappropriate the use of a CAC scheme in certain scenarios with specific trust assumptions and requirements. For instance, assuming that the proxy runs at the premises of the organization avoids the vendor lock-in effect but may give rise to other security concerns (e.g., malicious insiders attackers). To the best of our knowledge, no previous work considers how to select the best possible architecture (i.e., the assignment of entities to domains) to deploy a CAC scheme for the trust assumptions and requirements of a given scenario. In this article, we propose a methodology to assist administrators in exploring different architectures for the enforcement of CAC schemes in a given scenario. We do this by identifying the possible architectures underlying the CAC schemes available in the literature and formalizing them in simple set theory. This allows us to reduce the problem of selecting the most suitable architectures satisfying a heterogeneous set of trust assumptions and requirements arising from the considered scenario to a decidable Multi-objective Combinatorial Optimization Problem (MOCOP) for which state-of-the-art solvers can be invoked. Finally, we show how we use the capability of solving the MOCOP to build a prototype tool assisting administrators to preliminarily perform a “What-if” analysis to explore the trade-offs among the various architectures and then use available standards and tools (such as TOSCA and Cloudify) for automated deployment in multiple CSPs.


2022 ◽  
Vol 30 (2) ◽  
pp. 0-0

This study uses the critical incident technique to collect and analyze incidents of service failure and success involving a logistics sharing service in which the service providers are individuals. The authors also explore the key factors that affect customer satisfaction, along with the official and ideal recovery strategies. Data is based on interviews with 35 business users in Taiwan in 2017. A card sorting exercise is employed to classify the collected incidents and strategies into categories. The results show that the determinants of success and failure in logistics sharing services include drivers, platform operation, the matching system, and communication. Compensation is the most effective recovery strategy, whereas doing nothing is the least effective. Suggestions based on our results can help managers of the sharing economy to avoid or recover from failures and attain success.


2022 ◽  
Vol 30 (2) ◽  
pp. 1-16
Author(s):  
Shiu-Li Huang ◽  
Ya-Jung Lee

This study uses the critical incident technique to collect and analyze incidents of service failure and success involving a logistics sharing service in which the service providers are individuals. The authors also explore the key factors that affect customer satisfaction, along with the official and ideal recovery strategies. Data is based on interviews with 35 business users in Taiwan in 2017. A card sorting exercise is employed to classify the collected incidents and strategies into categories. The results show that the determinants of success and failure in logistics sharing services include drivers, platform operation, the matching system, and communication. Compensation is the most effective recovery strategy, whereas doing nothing is the least effective. Suggestions based on our results can help managers of the sharing economy to avoid or recover from failures and attain success.


Author(s):  
Neha Kewate

Abstract: Cloud computing is something simple we can define as maintaining data centers and data servers and also u can access technology services by computing power, storage, and database using cloud computing technology AWS(Amazon Web Services). It is an emerged model which is already popular among almost all enterprises. It provides us the concept of ondemand services where we are using and scaling cloud resources on demand and as per demand respectively. AWS Cloud computing is a cost-effective model. The major concern in this model is Security and Storage in the cloud. This is one of the major reasons many enterprises of choosing AWS cloud computing. This paper provides a review of security research in the field of cloud security and storage services of the AWS cloud platform. After security and storage, we have presented the working of AWS (Amazon Web Service) cloud computing. AWS is the most trusted provider of cloud computing which not only provides excellent cloud security but also provides excellent cloud storage services. The main aim of this paper is to make cloud computing storage and security a core operation and not an add-on operation. As per the increase in the Service provider and related companies, this AWS Cloud Platform plays a vital role in service industries by giving its best web services, so, therefore, choosing the cloud service providers wisely is the basic need of the industry. Therefore we are going to see how AWS fulfills all these specific needs. Keywords: Trusted Computing, AWS, Information-Centric Security, Cloud Storage, S3, EC2, Cloud Computing


YMER Digital ◽  
2022 ◽  
Vol 21 (01) ◽  
pp. 226-240
Author(s):  
Sasmita Pattnaik ◽  
◽  
Uma Sankar Mishra ◽  

Service providers in Indian telecommunication industry are now facing lots of challenges for their sustainability in tough competition because of varying wants of customers. Provision of quality service, initiatives of public relationship programmes, and generation of timely customer satisfaction are now of major concerns. In addition to these, positioning a proper brand image in customers’ mindset is equally important. The present study investigates all these factors of service business concerns to know the key determinants of achieving appropriate customer loyalty. Around 214 numbers of cell phone users were surveyed through a structured tested questionnaire in the state of Odisha, India and then all collected responses were analyzed through structural equation models. Study results showed that perception on public relation moderated by brand image has no role in creating customer loyalty. Again, after introduction of brand image as moderator, the impact of service quality on customer satisfaction becomes insignificant. However, customer satisfaction plays a major role in the variation of customer loyalty.


2022 ◽  
Vol 2 ◽  
Author(s):  
Carli Friedman

BackgroundQuality of life is multidimensional—influenced by individual, organizational, and environmental factors. As such, when examining personal outcomes, it is also important to consider meso and macro factors that contribute to people with intellectual and developmental disabilities' (IDD's) quality of life. While it is widely acknowledged that organizational factors contribute to people's quality of life, there is less research directly examining how the quality of human service providers contributes to people with IDD's personal outcomes. For these reasons, the aim of this study was to explore the relationship between provider quality and people with IDD's personal quality of life outcomes.MethodsUsing a multilevel linear regression we analyzed secondary Personal Outcome Measures® (personal outcomes) and Basic Assurances® (provider quality) data from 2,900 people with IDD served by 331 human service providers.ResultsPeople with IDD's personal outcomes, regardless of their support needs or other demographics, were significantly impacted by the quality of the human service providers they received services from—the higher the quality of the provider, the more personal outcomes they had present. In addition, the following demographic covariates were correlated with personal outcomes: gender; race; complex support needs; residence type; and organizations that offered therapy services.DiscussionWhile quality improvement initiatives may require a great deal of cost and time commitment from providers, our findings suggest the effort translates to improved personal outcomes among people with IDD. The ultimate goal of service providers should be improvement of quality of life among those they support.


Sign in / Sign up

Export Citation Format

Share Document