Comparison of cloud service providers based on direct and recommended trust rating

M Supriya, K Sangeeta, GK Patra - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
Cloud computing provides many opportunities for enterprises by offering a range of
computing services. In today's competitive environment, the service dynamism, elasticity …

Modeling correlation between QoS attributes for trust computation in cloud computing environments

M Mrabet, YB Saied, LA Saidane - 2017 17th IEEE/ACM …, 2017 - ieeexplore.ieee.org
This paper introduces an approach that handleswith the trustworthy cloud service selection
issue in Cloudcomputing environments. Despite the fact that most of theexisting trust …

Evaluating trust-based access control for social interaction

L Jia, M Collins, P Nixon - 2009 Third International Conference …, 2009 - ieeexplore.ieee.org
Ubiquitous computing connects computers, places, people and everyday objects together by
providing the support for social interactions in our everyday computing environment. Such …

[PDF][PDF] An Efficient Feedback-based Trust Model for Pervasive Computing

J Chen, SD Bruda - International Journal of Digital Content Technology …, 2010 - Citeseer
In pervasive computing environments, pervasive devices should collaborate effectively such
that the vision of pervasive computing will come true. However, without trust, pervasive …

A trust model in cloud computing based on fuzzy logic

S Jain - 2016 IEEE International Conference on Recent …, 2016 - ieeexplore.ieee.org
Trust is a vital factor, especially for service oriented systems in the area of Information
Technology and Security. Several issues have been raised by enterprises and individuals …

A trust-based access control model for pervasive computing applications

M Toahchoodee, R Abdunabi, I Ray, I Ray - Data and Applications …, 2009 - Springer
With the rapid growth in wireless networks and sensor and mobile devices, we are moving
towards an era of pervasive computing. Access control is challenging in these environments …

Trustworthy web service selection using probabilistic models

M Mehdi, N Bouguila, J Bentahar - 2012 IEEE 19th …, 2012 - ieeexplore.ieee.org
Software architectures of large-scale systems are perceptibly shifting towards employing
open and distributed computing. Service Oriented Computing (SOC) is a typical example of …

Trust, security and privacy for pervasive applications

G Wang, W Zhou, LT Yang - The Journal of Supercomputing, 2013 - Springer
Pervasive computing, or ubiquitous computing, has evolved into an active research area, as
a result of the tremendous advances in a broad range of technologies, including wireless …

A trust model based on service classification in mobile services

Y Liu, Z Chen, F Xia, X Lv, F Bu - … IEEE/ACM Int'l Conference on …, 2010 - ieeexplore.ieee.org
Internet of Things (IoT) and B3G/4G communication are promoting the pervasive mobile
services with its advanced features. However, security problems are also baffled the …

Learning automation policies for pervasive computing environments

BD Ziebart, D Roth, RH Campbell… - … Computing (ICAC'05), 2005 - ieeexplore.ieee.org
If current trends in cellular phone technology, personal digital assistants, and wireless
networking are indicative of the future, we can expect our environments to contain an …