Skip to main content

Trusted Priority Control Design for Information Networks Based on Sociotechnology

  • Conference paper
Autonomic and Trusted Computing (ATC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4158))

Included in the following conference series:

  • 768 Accesses

Abstract

In order to achieve the optimum theoretical network values as described in this paper, it is necessary to provide a link between Information Technology (IT) and Social Network (SN) considerations. Since for an SN in an on-line community the characteristics of both individual participants and the group organization can be expressed in the same graph, the SN can be related to the IT design because the organization aspects of the SN are relevant to the network communities formed by the IT network. As an example of an application using both IT and SN aspects, a novel trusted priority control method for VPNs is proposed as a case study and its effectiveness is demonstrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Huysman, M., Wulf, V.: Social Capital and Information Technology. The MIT Press, Cambridge (2004)

    Google Scholar 

  2. Horrigan, J., Lee, R., Fox, S.: Online Communities: Networks that Nurture Long-distance Relationships and Local Ties. In: Pew Internet and American Life Projects (2001), www.pewinternet.org

  3. http://www.reed.com/Papers/GFN/reedslaw.html

  4. Dunbar, R.: Grooming, Gossip and the Evolution of Language. Faber and Faber, London (1996)

    Google Scholar 

  5. Yoshikai, N.: A Network value model and its application to technology evaluation for the on-line community. In: APSITT 2005, pp. 399–404 (November 2005)

    Google Scholar 

  6. Kanemitsu, J.: Social Network Analysis. Keisou-shobou (in Japanese) (2003)

    Google Scholar 

  7. Kanemitsu, J.: From Social Capital to Human Capital: Theory and Analysis of Social Capital. In: Aoyama Management Review, pp. 45–52 (in Japanese) (2002)

    Google Scholar 

  8. Faust, K.: Centrality in affiliation networks. Social Network 19, 157–191 (1997)

    Article  Google Scholar 

  9. Social Network Analysis Software NetMiner, http://www.netminer.com/NetMiner

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoshikai, N. (2006). Trusted Priority Control Design for Information Networks Based on Sociotechnology. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_26

Download citation

  • DOI: https://doi.org/10.1007/11839569_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38619-3

  • Online ISBN: 978-3-540-38622-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics