A Trust Management Package for Policy-Driven Protection & Personalization of Web Content

Author(s):  
Juri L. De Coi ◽  
Daniel Olmedilla ◽  
Sergej Zerr ◽  
Piero A. Bonatti ◽  
Luigi Sauro
Keyword(s):  
2009 ◽  
Vol 4 (2) ◽  
pp. 2-8 ◽  
Author(s):  
Wiesław Maria Grudzewski ◽  
Irena Krystyna Hejduk ◽  
Anna Sankowska

2017 ◽  
Vol 9 (2) ◽  
pp. 67-71
Author(s):  
Herru Darmadi ◽  
Yan Fi ◽  
Hady Pranoto

Learning Object (LO) is a representation of interactive content that are used to enrich e-learning activities. The goals of this case study were to evaluate accessibility and compatibility factors from learning objects that were produced by using BINUS E-learning Authoring Tool. Data were compiled by using experiment to 30 learning objects by using stratified random sampling from seven faculties in undergraduate program. Data were analyzed using accessibility and compatibility tests based on Web Content Accessibility Guidelines 2.0 Level A. Results of the analysis for accessibility and compatibility tests of Learning Objects was 90% better than average. The result shows that learning objects is fully compatible with major web browser. This paper also presents five accessibility problems found during the test and provide recommendation to overcome the related problems. It can be concluded that the learning objects that were produced using BINUS E-learning Authoring Tool have a high compatibility, with minor accessibility problems. Learning objects with a good accessibility and compatibility will be beneficial to all learner with or without disabilities during their learning process. Index Terms—accessibility, compatibility, HTML, learning object, WCAG2.0, web


2005 ◽  
Author(s):  
Lalana Kagal ◽  
Jeffrey Undercoffer ◽  
Filip Perich ◽  
Anupam Joshi ◽  
Tim Finin

2012 ◽  
Author(s):  
Kamlesh Padaliya ◽  
Amarjeet Singh ◽  
Ashutosh Kumar Bhatt ◽  
Manoj Chandra Lohani

2010 ◽  
Vol 29 (2) ◽  
pp. 278-290 ◽  
Author(s):  
Gabriel López Millán ◽  
Manuel Gil Pérez ◽  
Gregorio Martínez Pérez ◽  
Antonio F. Gómez Skarmeta
Keyword(s):  

2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


Sign in / Sign up

Export Citation Format

Share Document