Trusted network management model based on clustering analysis

HA Xie, D Li - … Science, Technology and Application: Proceedings of …, 2017 - World Scientific
In order to solve the problems of accuracy and availability in traditional network trust
evaluation, a new trusted network management model based on clustering analysis was …

ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture

L Bradatsch, O Miroshkin, F Kargl - IEEE Access, 2023 - ieeexplore.ieee.org
Recently, zero trust security has received notable attention in the security community.
However, while many networks use monitoring and security functions like firewalls, their …

[引用][C] Research on trusted computing and its development

S Changxiang, Z Huanguo… - SCIENCE …, 2010 - SCIENCE PRESS 16 …

Automated trust negotiation in open systems

AJ Lee, KE Seamons, M Winslett, T Yu - Secure Data Management in …, 2007 - Springer
To trust an entity means to have strong confidence in the integrity and ability of that entity to
perform according to one's expections [24]. Trust relationships between entities are …

Precursor: A fast, client-centric and trusted key-value store using rdma and intel sgx

I Messadi, S Neumann, N Weichbrodt… - Proceedings of the …, 2021 - dl.acm.org
As offered by the Intel Software Guard Extensions (SGX), trusted execution enables
confidentiality and integrity for off-site deployed services. Thereby, securing key-value stores …

[图书][B] Trusted Computing for Embedded Systems

B Candaele, D Soudris, I Anagnostopoulos - 2015 - Springer
Computing systems have a tremendous impact on everyday life in all domains, from the
internet to consumer electronics, transportation to manufacturing, medicine, energy, and …

[图书][B] A trust supportive framework for pervasive computing systems

D Peng - 2009 - search.proquest.com
Recent years have witnessed the emergence and rapid growth of pervasive computing
technologies such as mobile ad hoc networks, radio frequency identification (RFID), Wi-Fi …

[PDF][PDF] Trusted web service

Z Song, S Lee, R Masuoka - 2nd Workshop on Advances in Trusted …, 2006 - Citeseer
Abstract “Remote Attestation”, a concept well known in the Web Security domain, provides
the capability to measure and verify the hardware and software settings of the platform …

Performance Analysis of a Keyword-Based Trust Management System for Fog Computing

AM Alwakeel - Applied Sciences, 2023 - mdpi.com
This study presents a novel keyword-based trust management system for fog computing
networks aimed at improving network efficiency and ensuring data integrity. The proposed …

Enhancing Trusted Cloud Computing Platform for Infrastructure as a Service.

KIM Heeyoul - Advances in Electrical & Computer …, 2017 - search.ebscohost.com
The characteristics of cloud computing including on-demand self-service, resource pooling,
and rapid elasticity have made it grow in popularity. However, security concerns still obstruct …