• 제목/요약/키워드: Trustworthy

검색결과 247건 처리시간 0.023초

Trustworthy Service Discovery for Dynamic Web Service Composition

  • Kim, Yukyong;Choi, Jong-Seok;Shin, Yongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1260-1281
    • /
    • 2015
  • As the number of services available on the Web increases, it is vital to be able to identify which services can be trusted. Since there can be an extremely large number of potential services that offer similar functionality, it is challenging to select the right ones. Service requestors have to decide which services closelysatisfy their needs, and theymust worry about the reliability of the service provider. Although an individual service can be trusted, a composed service is not guaranteed to be trustworthy. In this paper, we present a trust model that supports service discovery and composition based on trustworthiness. We define a method to evaluate trust in order to discover trustworthy services. We also provide a method to perform trust estimation for dynamic service composition, and we present results of two experiments. The proposed model allows for service requestors to obtain the most trustworthy services possible. Our mechanism uses direct and indirect user experience to discover the trustworthiness of the services and service providers. Moreover, composing services based on quantitative trust measurements will allow for consumers to acquire a highly reliable service that meet their quality and functional requirements.

Roadmap Toward Certificate Program for Trustworthy Artificial Intelligence

  • Han, Min-gyu;Kang, Dae-Ki
    • International journal of advanced smart convergence
    • /
    • 제10권3호
    • /
    • pp.59-65
    • /
    • 2021
  • In this paper, we propose the AI certification standardization activities for systematic research and planning for the standardization of trustworthy artificial intelligence (AI). The activities will be in two-fold. In the stage 1, we investigate the scope and possibility of standardization through AI reliability technology research targeting international standards organizations. And we establish the AI reliability technology standard and AI reliability verification for the feasibility of the AI reliability technology/certification standards. In the stage 2, based on the standard technical specifications established in the previous stage, we establish AI reliability certification program for verification of products, systems and services. Along with the establishment of the AI reliability certification system, a global InterOp (Interoperability test) event, an AI reliability certification international standard meetings and seminars are to be held for the spread of AI reliability certification. Finally, TAIPP (Trustworthy AI Partnership Project) will be established through the participation of relevant standards organizations and industries to overall maintain and develop standards and certification programs to ensure the governance of AI reliability certification standards.

Study on Net Assessment of Trustworthy Evidence in Teleoperation System for Interplanetary Transportation

  • Wen, Jinjie;Zhao, Zhengxu;Zhong, Qian
    • Journal of Information Processing Systems
    • /
    • 제15권6호
    • /
    • pp.1472-1488
    • /
    • 2019
  • Critical elements in the China's Lunar Exploration reside in that the lunar rover travels over the surrounding undetermined environment and it conducts scientific exploration under the ground control via teleoperation system. Such an interplanetary transportation mission teleoperation system belongs to the ground application system in deep space mission, which performs terrain reconstruction, visual positioning, path planning, and rover motion control by receiving telemetry data. It plays a vital role in the whole lunar exploration operation and its so-called trustworthy evidence must be assessed before and during its implementation. Taking ISO standards and China's national military standards as trustworthy evidence source, the net assessment model and net assessment method of teleoperation system are established in this paper. The multi-dimensional net assessment model covering the life cycle of software is defined by extracting the trustworthy evidences from trustworthy evidence source. The qualitative decisions are converted to quantitative weights through the net assessment method (NAM) combined with fuzzy analytic hierarchy process (FAHP) and entropy weight method (EWM) to determine the weight of the evidence elements in the net assessment model. The paper employs the teleoperation system for interplanetary transportation as a case study. The experimental result drawn shows the validity and rationality of net assessment model and method. In the final part of this paper, the untrustworthy elements of the teleoperation system are discovered and an improvement scheme is established upon the "net result". The work completed in this paper has been applied in the development of the teleoperation system of China's Chang'e-3 (CE-3) "Jade Rabbit-1" and Chang'e-4 (CE-4) "Jade Rabbit-2" rover successfully. Besides, it will be implemented in China's Chang'e-5 (CE-5) mission in 2019. What's more, it will be promoted in the Mars exploration mission in 2020. Therefore it is valuable to the development process improvement of aerospace information system.

조직에서 상사에 대한 신뢰가 직무만족 및 조직몰입에 미치는 영향에 관한 실증적 연구 (An Empirical Study on the Effects of Trust toward Supervisor on Job Satisfaction and Organizational Commitment in Organization)

  • 양훈모;조진탁
    • 산업융합연구
    • /
    • 제2권1호
    • /
    • pp.139-158
    • /
    • 2004
  • The purpose of this study is to examine antecedents and outcomes of trust toward supervisor in organization. The model is developed by reviewing previous research providing various perspectives. Antecedents consisted of three trustworthy behaviors - ability, benevolence, integrity - and three transformational leader behaviors - performance management, motivation, team-orientation -, and job satisfaction and organizational commitment is used outcome variables of trust. Data was collected from 206 employees in 6 organizations in broadcasting industry, using self-report questionnaire. Study finding is as following. First, trust in model was composed by 2 type - affect-based trust and cognition-based trust -, not divided in empirical analysis. Second, regression analysis for trust carry out independently, jointly with trustworthy behaviors and leadership behaviors. In antecedents of trust trustworthy behaviors, ability and benevolence has positive effects to trust, integrity has negative relationship with trust. It was high correlation between trustworthy behavior and leadership behavior. Especially, it has highly correlate(correlation efficient 0.69) between ability and team-orientation that influences trust strongly. Third, trust was not significant relationship with individual variables such as age, period with supervisor. Only, it found significant gap in variables and found out different relationship between variables among organizations distinctly. Fourth, job satisfaction and organizational commitment was positive influenced by trust and found out strong relationship between trust and organizational commitment.

  • PDF

Integral Attacks on Some Lightweight Block Ciphers

  • Zhu, Shiqiang;Wang, Gaoli;He, Yu;Qian, Haifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4502-4521
    • /
    • 2020
  • At EUROCRYPT 2015, Todo proposed a new technique named division property, and it is a powerful technique to find integral distinguishers. The original division property is also named word-based division property. Later, Todo and Morii once again proposed a new technique named the bit-based division property at FSE 2016 and find more rounds integral distinguisher for SIMON-32. There are two basic approaches currently being adopted in researches under the bit-based division property. One is conventional bit-based division property (CBDP), the other is bit-based division property using three-subset (BDPT). Particularly, BDPT is more powerful than CBDP. In this paper, we use Boolean Satisfiability Problem (SAT)-aided cryptanalysis to search integral distinguishers. We conduct experiments on SIMON-32/-48/-64/-96, SIMON (102)-32/-48/-64, SIMECK-32/-48/-64, LBlock, GIFT and Khudra to prove the efficiency of our method. For SIMON (102)-32/-48/-64, we can determine some bits are odd, while these bits can only be determined as constant in the previous result. For GIFT, more balanced (zero-sum) bits can be found. For LBlock, we can find some other new integral distinguishers. For Khudra, we obtain two 9-round integral distinguishers. For other ciphers, we can find the same integral distinguishers as before.

MANET에서 서비스 발견 및 전달을 위한 오버레이 네트워크 기반의 T-Chord 링 시스템 (T-Chord Ring System based on Overlay Network for Service Discovery and Delivery in MANET)

  • 한인성;정홍식;박무성
    • 전자공학회논문지
    • /
    • 제50권1호
    • /
    • pp.51-63
    • /
    • 2013
  • MANET의 기반 연구 기술들의 결과를 토대로 현실 속에서 MANET을 활용하기 위한 응용으로써 다양한 서비스 발견 및 전달 기법들이 제안되고 있다. 본 논문에서는 MANET에서의 메시지 오버헤드의 최소화와 안정적인 서비스 발견 및 네트워크의 확장성을 보장하기 위한 T-Chord(Trustworthy-based Chord) 링 시스템을 제안한다. T-Chord 링 시스템은 모바일 환경에서 이동 노드들이 제공하는 서비스들을 효율적으로 관리하기 위해 P2P 오버레이 네트워크 기법을 이용한 서비스 발견 시스템으로, MANET에서 이동 노드들은 이동성을 갖으며 서비스 요청 노드, 서비스 제공 노드 그리고 서비스 전달 노드로써 동작하기 위해 이동 노드들의 Trustworthy 평가와 분산된 서비스 정보의 수집, P2P 오버레이 네트워크의 구성을 통한 O(Log N) 성능을 제공하는 Chord 알고리즘 모듈로 내부 시스템을 구성하였다. 시스템의 성능 평가는 NS2 시뮬레이터를 이용하여 기존의 서비스 발견 기법들과 서비스 발견 메시지 오버헤드, 서비스 발견 및 전달의 효율성, 네트워크의 확장성 측면에서 성능을 비교 평가하고 분석함으로써 MANET에서 효과적인 서비스 발견 및 전달의 우수함을 입증하였다.

믿을 수 있는 디지털 아카이브 인증기준: OASIS 적용사례 (Trustworthy Repositories Audit Criteria: Self-Assessment of OASIS)

  • 이소연
    • 정보관리학회지
    • /
    • 제25권3호
    • /
    • pp.5-25
    • /
    • 2008
  • 현대사회의 개인과 단체가 일상적으로 생산하는 다양한 디지털 객체는 현대 인류에게는 정보자산이지만 미래 인류에게는 소중한 디지털 유산이 된다. TRAC은 디지털 보존이라는 막중한 책무를 자임한 디지털 아카이브가 그 책무를 실효성 있는 방식으로 수행하고 있는지를 평가하기 위한 도구의 하나이다. 이 논문은 TRAC과 우리 나라의 웹자원에 대한 장기적 접근을 제공하는 것을 목적으로 하는 국립중앙도서관의 OASIS 간의 격차를 분석하고자 하는 목적으로 수행되었다. 평가 결과, OASIS는 조직 및 기술인프라 측면에 비하여 장기 보존 기능을 포함한 객체관리 인프라가 취약한 상태임이 확인되었다.

EETCA: Energy Efficient Trustworthy Clustering Algorithm for WSN

  • Senthil, T.;Kannapiran, Dr.B.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5437-5454
    • /
    • 2016
  • A Wireless Sensor Network (WSN) is composed of several sensor nodes which are severely restricted to energy and memory. Energy is the lifeblood of sensors and thus energy conservation is a critical necessity of WSN. This paper proposes a clustering algorithm namely Energy Efficient Trustworthy Clustering algorithm (EETCA), which focuses on three phases such as chief node election, chief node recycling process and bi-level trust computation. The chief node election is achieved by Dempster-Shafer theory based on trust. In the second phase, the selected chief node is recycled with respect to the current available energy. The final phase is concerned with the computation of bi-level trust, which is triggered for every time interval. This is to check the trustworthiness of the participating nodes. The nodes below the fixed trust threshold are blocked, so as to ensure trustworthiness. The system consumes lesser energy, as all the nodes behave normally and unwanted energy consumption is completely weeded out. The experimental results of EETCA are satisfactory in terms of reduced energy consumption and prolonged lifetime of the network.

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost