Blockchain guided trustworthy interactions for distributed disaster management

E Samir, M Azab, Y Jung - 2019 IEEE 10th Annual Information …, 2019 - ieeexplore.ieee.org
Given the devastating outcomes of the recent hurricanes, earthquakes, and floods across
the globe, governments all over the world started to pay serious attention to their disaster …

Goals within trust-based digital ecosystems

E Cioroaica, A Purohit, B Buhnova… - 2021 IEEE/ACM Joint …, 2021 - ieeexplore.ieee.org
Within a digital ecosystem, systems and actors form coalitions for achieving common and
individual goals. In a constant motion of collaborative and competitive forces and faced with …

Trustworthy iot: An evidence collection approach based on smart contracts

CA Ardagna, R Asal, E Damiani… - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Today, Internet of Things (IoT) implements an ecosystem where a panoply of interconnected
devices collect data from physical environments and supply them to processing services, on …

Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain

Y Liu, X Xing, Z Tong, X Lin, J Chen… - … on Dependable and …, 2023 - ieeexplore.ieee.org
The cloud-edge-end architecture is suitable for many essential scenarios, such as 5 G, the
Internet of Things (IoT), and mobile edge computing. Under this architecture, cross-domain …

[引用][C] The evolution of cloud computing security: addressing emerging threats

P Muralidhara - International journal of computer science and …, 2017

Toward architectural and protocol-level foundation for end-to-end trustworthiness in Cloud/Fog computing

Z Su, F Biennier, Z Lv, Y Peng… - IEEE transactions on …, 2017 - ieeexplore.ieee.org
With Cloud/Fog Computing being a paradigm combination of IoT context and Edge
Computing extended with Cloud/Fog, business process in it involves dataflows among multi …

Sharing machine learning models as indicators of compromise for cyber threat intelligence

D Preuveneers, W Joosen - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about
cyber attacks to help organizations gain a better understanding of threats and proactively …

Evaluation and establishment of trust in cloud federation

A Kanwal, R Masood, MA Shibli - … of the 8th International Conference on …, 2014 - dl.acm.org
Cloud federation is a future evolution of Cloud computing, where Cloud Service Providers
(CSP) collaborate dynamically to share their virtual infrastructure for load balancing and …

Toward a blockchain-based framework for challenge-based collaborative intrusion detection

W Li, Y Wang, J Li, MH Au - International Journal of Information Security, 2021 - Springer
Network intrusions are a big threat to network and system assets, which have become more
complex to date. To enhance the detection performance, collaborative intrusion detection …

Blockchain-aided Decentralized Trust Management of Edge Computing: Towards Reliable Off-chain and On-chain Trust

L Shi, T Wang, Z Xiong, Z Wang, Y Liu, J Li - IEEE Network, 2024 - ieeexplore.ieee.org
As a shared and distributed database, blockchain empowers distributed edge computing
(EC) networks with decentralization, integrity, and auditability of trust management …