Enabling privacy in pervasive computing using fusion of privacy negotiation, identity management and trust management techniques

AJ Blazic, K Dolinar, J Porekar - … on the Digital Society (ICDS'07 …, 2007 - ieeexplore.ieee.org
Designing and composing pervasive systems of the next generation networks is a
technological as well as social challenge due to its complexity and its unpredictable nature …

[PDF][PDF] Trust and mobility aware service provision for pervasive computing

L McNamara, C Mascolo, L Capra - Pervasive 2006 Workshop …, 2006 - Citeseer
Successful provision of services in pervasive networks represents a major challenge. The
requester of a service or resource should be able to decide whom to rely on, not simply …

A new trust evaluation approach for cloud computing environments

M Mrabet, Y ben Saied… - … Evaluation and Modeling …, 2016 - ieeexplore.ieee.org
This paper introduces a novel trust evaluation approach for the cloud computing domain.
The wide majority of the existing trust systems are either limited to the qualitative or the …

TRUST-CAP: A trust model for cloud-based applications

EG Abdallah, M Zulkernine, YX Gu… - 2017 IEEE 41st annual …, 2017 - ieeexplore.ieee.org
Cloud computing provides an opportunity for individuals and organizations to extend their
capabilities by offering elastic computing resources. Trust is a major challenge in cloud …

Trust-based development framework for distributed systems and IoT

M Dorodchi, M Abedi, B Cukic - 2016 IEEE 40th Annual …, 2016 - ieeexplore.ieee.org
Trust is a critical factor when dealing with the distributed systems and Internet of Things
(IoT). Therefore, in developing, enhancing, and modifying such systems trust has to be …

Trust assessment in cloud environment: Taxonomy and analysis

S Deshpande, R Ingle - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Cloud environment consists of many components playing different roles which need to
interact with each other. Based on the context the nature of interaction may vary. Trust is an …

Trust evaluation in cloud based on friends and third party's recommendations

S Singh, D Chand - 2014 Recent Advances in Engineering and …, 2014 - ieeexplore.ieee.org
Establishing trust among service providers and service consumers is very essential and
important factor for the widespread use and popularity of any distributed environment which …

Assessment criteria for trust models in cloud computing

A Kanwal, R Masood, UE Ghazia… - … on Green Computing …, 2013 - ieeexplore.ieee.org
Cloud computing is an emerging technology that provides elastic and flexible computing
resources to the existing capabilities of business world. Besides several benefits of Cloud …

On the application of supervised machine learning to trustworthiness assessment

S Hauke, S Biedermann… - 2013 12th IEEE …, 2013 - ieeexplore.ieee.org
State-of-the art trust and reputation systems seek to apply machine learning methods to
overcome generalizability issues of experience-based Bayesian trust assessment. These …

A trust analysis methodology for pervasive computing systems

SL Presti, M Butler, M Leuschel, C Booth - … and Applications in HCI and E …, 2005 - Springer
We present an analysis Trust Analysis Methodology for finding trust issues within pervasive
computing systems. It is based on a systematic analysis of scenarios that describe the typical …