• Title/Summary/Keyword: Trustworthy

Search Result 242, Processing Time 0.029 seconds

Trustworthy Service Discovery for Dynamic Web Service Composition

  • Kim, Yukyong;Choi, Jong-Seok;Shin, Yongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1260-1281
    • /
    • 2015
  • As the number of services available on the Web increases, it is vital to be able to identify which services can be trusted. Since there can be an extremely large number of potential services that offer similar functionality, it is challenging to select the right ones. Service requestors have to decide which services closelysatisfy their needs, and theymust worry about the reliability of the service provider. Although an individual service can be trusted, a composed service is not guaranteed to be trustworthy. In this paper, we present a trust model that supports service discovery and composition based on trustworthiness. We define a method to evaluate trust in order to discover trustworthy services. We also provide a method to perform trust estimation for dynamic service composition, and we present results of two experiments. The proposed model allows for service requestors to obtain the most trustworthy services possible. Our mechanism uses direct and indirect user experience to discover the trustworthiness of the services and service providers. Moreover, composing services based on quantitative trust measurements will allow for consumers to acquire a highly reliable service that meet their quality and functional requirements.

Roadmap Toward Certificate Program for Trustworthy Artificial Intelligence

  • Han, Min-gyu;Kang, Dae-Ki
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.59-65
    • /
    • 2021
  • In this paper, we propose the AI certification standardization activities for systematic research and planning for the standardization of trustworthy artificial intelligence (AI). The activities will be in two-fold. In the stage 1, we investigate the scope and possibility of standardization through AI reliability technology research targeting international standards organizations. And we establish the AI reliability technology standard and AI reliability verification for the feasibility of the AI reliability technology/certification standards. In the stage 2, based on the standard technical specifications established in the previous stage, we establish AI reliability certification program for verification of products, systems and services. Along with the establishment of the AI reliability certification system, a global InterOp (Interoperability test) event, an AI reliability certification international standard meetings and seminars are to be held for the spread of AI reliability certification. Finally, TAIPP (Trustworthy AI Partnership Project) will be established through the participation of relevant standards organizations and industries to overall maintain and develop standards and certification programs to ensure the governance of AI reliability certification standards.

Study on Net Assessment of Trustworthy Evidence in Teleoperation System for Interplanetary Transportation

  • Wen, Jinjie;Zhao, Zhengxu;Zhong, Qian
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1472-1488
    • /
    • 2019
  • Critical elements in the China's Lunar Exploration reside in that the lunar rover travels over the surrounding undetermined environment and it conducts scientific exploration under the ground control via teleoperation system. Such an interplanetary transportation mission teleoperation system belongs to the ground application system in deep space mission, which performs terrain reconstruction, visual positioning, path planning, and rover motion control by receiving telemetry data. It plays a vital role in the whole lunar exploration operation and its so-called trustworthy evidence must be assessed before and during its implementation. Taking ISO standards and China's national military standards as trustworthy evidence source, the net assessment model and net assessment method of teleoperation system are established in this paper. The multi-dimensional net assessment model covering the life cycle of software is defined by extracting the trustworthy evidences from trustworthy evidence source. The qualitative decisions are converted to quantitative weights through the net assessment method (NAM) combined with fuzzy analytic hierarchy process (FAHP) and entropy weight method (EWM) to determine the weight of the evidence elements in the net assessment model. The paper employs the teleoperation system for interplanetary transportation as a case study. The experimental result drawn shows the validity and rationality of net assessment model and method. In the final part of this paper, the untrustworthy elements of the teleoperation system are discovered and an improvement scheme is established upon the "net result". The work completed in this paper has been applied in the development of the teleoperation system of China's Chang'e-3 (CE-3) "Jade Rabbit-1" and Chang'e-4 (CE-4) "Jade Rabbit-2" rover successfully. Besides, it will be implemented in China's Chang'e-5 (CE-5) mission in 2019. What's more, it will be promoted in the Mars exploration mission in 2020. Therefore it is valuable to the development process improvement of aerospace information system.

An Empirical Study on the Effects of Trust toward Supervisor on Job Satisfaction and Organizational Commitment in Organization (조직에서 상사에 대한 신뢰가 직무만족 및 조직몰입에 미치는 영향에 관한 실증적 연구)

  • Yang, Hoon-Mo;Cho, Jin-Tak
    • Journal of Industrial Convergence
    • /
    • v.2 no.1
    • /
    • pp.139-158
    • /
    • 2004
  • The purpose of this study is to examine antecedents and outcomes of trust toward supervisor in organization. The model is developed by reviewing previous research providing various perspectives. Antecedents consisted of three trustworthy behaviors - ability, benevolence, integrity - and three transformational leader behaviors - performance management, motivation, team-orientation -, and job satisfaction and organizational commitment is used outcome variables of trust. Data was collected from 206 employees in 6 organizations in broadcasting industry, using self-report questionnaire. Study finding is as following. First, trust in model was composed by 2 type - affect-based trust and cognition-based trust -, not divided in empirical analysis. Second, regression analysis for trust carry out independently, jointly with trustworthy behaviors and leadership behaviors. In antecedents of trust trustworthy behaviors, ability and benevolence has positive effects to trust, integrity has negative relationship with trust. It was high correlation between trustworthy behavior and leadership behavior. Especially, it has highly correlate(correlation efficient 0.69) between ability and team-orientation that influences trust strongly. Third, trust was not significant relationship with individual variables such as age, period with supervisor. Only, it found significant gap in variables and found out different relationship between variables among organizations distinctly. Fourth, job satisfaction and organizational commitment was positive influenced by trust and found out strong relationship between trust and organizational commitment.

  • PDF

Integral Attacks on Some Lightweight Block Ciphers

  • Zhu, Shiqiang;Wang, Gaoli;He, Yu;Qian, Haifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4502-4521
    • /
    • 2020
  • At EUROCRYPT 2015, Todo proposed a new technique named division property, and it is a powerful technique to find integral distinguishers. The original division property is also named word-based division property. Later, Todo and Morii once again proposed a new technique named the bit-based division property at FSE 2016 and find more rounds integral distinguisher for SIMON-32. There are two basic approaches currently being adopted in researches under the bit-based division property. One is conventional bit-based division property (CBDP), the other is bit-based division property using three-subset (BDPT). Particularly, BDPT is more powerful than CBDP. In this paper, we use Boolean Satisfiability Problem (SAT)-aided cryptanalysis to search integral distinguishers. We conduct experiments on SIMON-32/-48/-64/-96, SIMON (102)-32/-48/-64, SIMECK-32/-48/-64, LBlock, GIFT and Khudra to prove the efficiency of our method. For SIMON (102)-32/-48/-64, we can determine some bits are odd, while these bits can only be determined as constant in the previous result. For GIFT, more balanced (zero-sum) bits can be found. For LBlock, we can find some other new integral distinguishers. For Khudra, we obtain two 9-round integral distinguishers. For other ciphers, we can find the same integral distinguishers as before.

T-Chord Ring System based on Overlay Network for Service Discovery and Delivery in MANET (MANET에서 서비스 발견 및 전달을 위한 오버레이 네트워크 기반의 T-Chord 링 시스템)

  • Han, Insung;Jeong, Hongsik;Park, Moosung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.51-63
    • /
    • 2013
  • Recently with base apply MANET with the application for the service discovery and delivery which are various techniques are being proposed the result of such MANET base research techniques from actual inside. This dissertation proposes T-Chord(Trustworthy-based Chord) Ring system for MANET to guarantees from such requirements. T-Chord Ring system in order to manage Efficiently the services which the mobile nodes provide is the service discovery system which uses P2P overlay network Technique in mobile environment. The system which is proposed MANET communications in order to accomplish a service discovery operation with physical network class and logical network class will be able to minimize problems from about MANET service discoveries, and uses the dispersive hash table technique for a service discovery and effectiveness of service discovery improves and will be able to guarantee the expandability of network size. The mobile nodes(mobile device) have a mobility from MANET and operate with service request node, service provide node and service transmit node. The mobile nodes will be able to elect cluster header using Trustworthy that was evaluated service request, provision and delivery in each other. The system which is proposed a service discovery and a delivery efficiently will compose the cluster head which will grow of P2P overlay networks and will be able to accomplish. The system which proposes from dissertation is composed of Trustworthy evaluations of MANET mobile nodes, service information collection which is dispersed and P2P overlay networks that composed of Chord algorithm modules which provide O(Log N) efficiencies. The system comparison evaluation analyzes an efficiency from the expandability side of effectiveness and the network of service discovery technique and the service discovery message over head, service discovery and delivery of former times and service discovery and delivery is excellent gives proof from MANET.

Trustworthy Repositories Audit Criteria: Self-Assessment of OASIS (믿을 수 있는 디지털 아카이브 인증기준: OASIS 적용사례)

  • Lee, So-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.5-25
    • /
    • 2008
  • Individuals and organizations in the modern society produce diverse digital objects everyday, which are not only valuable information resources at present but also will be invaluable digital heritage for the future generation. TRAC(Trustworthy Repositories Audit & Certification: Criteria & Checklist) is one of the evaluating tools against which digital archives could be assessed for their preparedness to perform the task of long-term preservation. The current study uses TRAC to assess OASIS(Online Archiving & Searching Internet Source). The results show that the web archive has a greater room for strengthening in the object management infrastructure than in organizational and technical infrastructures.

EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN

  • Senthil, T.;Kannapiran, Dr.B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5437-5454
    • /
    • 2016
  • A Wireless Sensor Network (WSN) is composed of several sensor nodes which are severely restricted to energy and memory. Energy is the lifeblood of sensors and thus energy conservation is a critical necessity of WSN. This paper proposes a clustering algorithm namely Energy Efficient Trustworthy Clustering algorithm (EETCA), which focuses on three phases such as chief node election, chief node recycling process and bi-level trust computation. The chief node election is achieved by Dempster-Shafer theory based on trust. In the second phase, the selected chief node is recycled with respect to the current available energy. The final phase is concerned with the computation of bi-level trust, which is triggered for every time interval. This is to check the trustworthiness of the participating nodes. The nodes below the fixed trust threshold are blocked, so as to ensure trustworthiness. The system consumes lesser energy, as all the nodes behave normally and unwanted energy consumption is completely weeded out. The experimental results of EETCA are satisfactory in terms of reduced energy consumption and prolonged lifetime of the network.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost