Trustworthy service provider selection in cloud computing environment

P Bedi, H Kaur, B Gupta - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Cloud computing is an emerging computing paradigm which allows sharing of massive,
heterogeneous, elastic resources among users. Despite of all the hype surrounding the …

Modeling interaction using trust and recommendation in ubiquitous computing environment

N Iltaf, A Ghafoor, M Hussain - EURASIP Journal on Wireless …, 2012 - Springer
To secure computing in pervasive environment, an adaptive trust and recommendation
based access control model (based on human notion of trust) is proposed. The proposed …

Trust management in cloud computing: a survey

MB Monir, MH AbdelAziz… - 2015 IEEE Seventh …, 2015 - ieeexplore.ieee.org
Cloud computing is a new computing model that involves outsourcing of computer
technologies due to the lack of their availability in certain locations. However, when there is …

Research directions for trust and security in human-centric computing

S Creese, M Goldsmith, B Roscoe… - Privacy, Security and Trust …, 2005 - Springer
Pervasive networks foresee communicating and computing devices embedded throughout
our environment. This will cause huge increases in the complexity of network infrastructures …

Features and benefits of trusted computing

J Teo - 2009 Information Security Curriculum Development …, 2009 - dl.acm.org
According to the latest Computer Security Institute (CSI) Annual Survey [7], computer
infractions and attacks remain a pervasive problem in today's interconnected, globalized …

Building trust management model for cloud computing

ASA Saleh, EMR Hamed… - 2014 9th International …, 2014 - ieeexplore.ieee.org
Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model
to build, evaluate and expose trust. It uses different techniques like sliding window technique …

Trust model for a cloud computing application and service

RAR Shaikh, M Sasikumar - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Cloud computing has attracted great attention due its various features. There are various
rising concerns in its growth, one of which is security. Trust between provider and a user is …

Privacy, trust and identity in pervasive computing: a review of technical challenges and future research directions

A Al-Karkhi, A Al-Yasiri, N Linge - arXiv preprint arXiv:1207.7242, 2012 - arxiv.org
Developments in pervasive computing introduced a new world of computing where
networked processors embedded and distributed in everyday objects communicating with …

Protected computing vs. trusted computing

A Maña, A Muñoz - 2006 1st International Conference on …, 2006 - ieeexplore.ieee.org
The trusted computing initiative represents an important effort towards more secure and
dependable computers and therefore towards the security of all computer-supported …

A security-supportive middleware architecture for pervasive computing

Z Liu, D Peng - 2006 2nd IEEE International Symposium on …, 2006 - ieeexplore.ieee.org
Pervasive computing systems are becoming widespread as the next generation of
computing systems. Many middleware-based researches are proposed to provide services …