A cloud security framework based on trust model and mobile agent

S Benabied, A Zitouni, M Djoudi - … International Conference on …, 2015 - ieeexplore.ieee.org
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With
the cloud computing, the market's entrance time is reduced, computing capabilities is …

Rbtrust: A recommendation belief based distributed trust management model for p2p networks

J Hu, Q Wu, B Zhou - 2008 10th IEEE International Conference …, 2008 - ieeexplore.ieee.org
An important challenge regarding peer's trust valuation in peer-to-peer (P2P) networks is
how to cope with such problems as dishonest feedbacks of malicious peers and collusions …

Byzantine resistant reputation-based trust management

A Bradai, W Ben-Ameur, H Afifi - 9th IEEE International …, 2013 - ieeexplore.ieee.org
Cloud computing is very useful for improving distributed applications performance. However,
it is difficult to manage risks related to trust when collaborating with unknown and potentially …

QoS based trust management model for Cloud IaaS

MK Goyal, A Aggarwal, P Gupta… - 2012 2nd IEEE …, 2012 - ieeexplore.ieee.org
Trust Models are used to enhance secure and reliable scheduling in Distributed, Grid and
Cloud environment. Trust models that are being proposed or implemented in Distributed and …

Enforcing trust as a means to improve adoption of connected wearable technologies

FR Jusob, C George, G Mapp - 2016 12th International …, 2016 - ieeexplore.ieee.org
This paper carries out a study on enforcing trust as a means to improve user adoption of
wearable technologies. These technologies can play an integral part in facilitating intelligent …

User behavior identification for trust management in pervasive computing systems

Z Liu, D Peng - 11th IEEE International Workshop on Future …, 2007 - ieeexplore.ieee.org
Pervasive computing systems are becoming widespread as the next generation of
computing systems. In pervasive computing systems, the users are frequently hopping from …

A multi-dimensional trust and reputation calculation model for cloud computing environments

A Singh, K Chatterjee - 2017 ISEA Asia security and privacy …, 2017 - ieeexplore.ieee.org
The Cloud Computing (CC) is an Internet-based technology which offers a shared pool of
highly available, virtualized, dynamically scalable, and configurable computing resources …

Rpr: A trust computation model for social internet of things

U Jayasinghe, NB Truong, GM Lee… - 2016 Intl IEEE …, 2016 - ieeexplore.ieee.org
Social Internet of Things (SIoT) is an evolutionary idea which combines traditional IoT
models with social network paradigms." Objects" in SIoT formulate social relationships with …

TrustAC: Trust-based access control for pervasive devices

F Almenárez, A Marín, C Campo, C García R - Security in Pervasive …, 2005 - Springer
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content,
but Do they know what are trustworthy users? How do they share such information in a …

Trust management in ubiquitous computing: A Bayesian approach

MK Denko, T Sun, I Woungang - Computer Communications, 2011 - Elsevier
Designing a trust management scheme that can effectively evaluate the relationships among
devices in pervasive computing environments is a challenging task. This paper continues …