Companies of the same industry sector are often connected into a corporate network for collaboration purposes. Each company maintains its own site and selectively shares a portion of its business data with the others. The corporate network is often used for sharing information among the participating companies and facilitating collaboration in a certain industry sector […]
DQF-A NOVEL DYNAMIC QUERY FORMS FOR DATABASE QUERIES
Traditional query forms are designed and predefined by developers or DBA in various information management systems. Traditional predefined query forms are not able to satisfy various ad-hoc queries from users on those databases. This abstract proposes DQF, a novel database query form interface, which is able to dynamically generate query forms. The essence of DQF […]
COMMTRUST-MINING E-COMMERCE FEEDBACK COMMENTS
Accurate trust evaluation is crucial for the success of e-commerce systems. Reputation reporting systems have been implemented in e-commerce systems such as eBay and Amazon (for third-party sellers), where overall reputation scores for sellers are computed by aggregating feedback ratings. Reputation-based trust models are widely used in e-commerce applications, and feedback ratings are aggregated to […]
DATABASE QUERIES IN DYNAMIC QUERY FORMS
In this abstract, we propose a Dynamic Query Form system: DQF, a query interface which is capable of dynamically generating query forms for users. Different from traditional document retrieval, users in database retrieval are often willing to perform many rounds of actions (i.e., refining query conditions) before identifying the final candidates. The essence of DQF […]
MINING E-COMMERCE FEEDBACK COMMENTS FOR COMPUTING MULTI-DIMENSIONAL TRUST
We propose Comment-based Multi-dimensional trust (CommTrust), a fine-grained multi-dimensional trust evaluation model by mining e-commerce feedback comments. With CommTrust, comprehensive trust profiles are computed for sellers, including dimension reputation scores and weights, as well as overall trust scores by aggregating dimension reputation scores. To the best of our knowledge, CommTrust is the first piece of […]
VERIFIABLE ATTRIBUTE-BASED KEYWORD SEARCH OVER OUTSOURCED ENCRYPTED DATA
In this abstract propose a novel cryptographic solution , called verifiable attribute-based keyword search ( VABKS ). The solution allows a data user, whose credentials satisfy a data owner’s access control policy, to (i) search over the data owner’s outsourced encrypted data, (ii) outsource the tedious search operatio ns to the cloud, and (iii) verify […]
SOURCE PRIVACY WITH HOP-BY-HOP MESSAGE AUTHENTICATION IN WIRELESS SENSOR NETWORKS
Message authentication plays a key role in thwarting unauthorized and corrupted messages from being forwarded in networks to save the precious sensor energy. For this reason, many authentication schemes have been proposed in literature to provide message authenticity and integrity verification for wireless sensor networks. In this abstract, we propose an unconditionally secure and efficient […]
VABKS OVER OUTSOURCED ENCRYPTED DATA
Cloud computing allows data owners to use massive data storage and vast computation capabilities at a very low price. Despite the benefits, data outsourcing deprives data owners of direct control over their outsourced data. It is common nowadays for data owners to outsource their data to the cloud. Since the cloud cannot be fully trusted, […]
DYNAMIC RESOURCE PRICING AND COMPETITION AMONG CLOUD PROVIDERS
The competition among providers leads to the dynamics of cloud resource pricing. Modelling this competition involves the description of the user’s choice behaviour and the formulation of the dynamic pricing strategies of providers to adapt to the market state. Cloud providers may cooperate with each other to improve their final revenue. Based on a Service […]
WIRELESS SENSOR NETWORKS WITH HOP-BY-HOP MESSAGE AUTHENTICATION AND SOURCE PRIVACY
In this abstract, we propose an unconditionally secure and efficient source anonymous message authentication (SAMA) scheme based on the optimal modified ElGamal signature (MES) scheme on elliptic curves. This MES scheme is secure against adaptive chosen-message attacks in the random oracle model. Our scheme enables the intermediate nodes to authenticate the message so that all […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- 6
- …
- 21
- Next Page »