A reference architecture for improving security and privacy in internet of things applications

ID Addo, SI Ahamed, SS Yau… - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
As the promise of the Internet of Things (IoT) materializes in our everyday lives, we are often
challenged with a number of concerns regarding the efficacy of the current data privacy …

Dynamic trust evaluation of wireless sensor networks based on multi-factor

J Song, X Li, J Hu, G Xu, Z Feng - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Most of the existing trust evaluation methods of wireless sensor networks focus on
communication behaviors in building paths without considering transmission behaviors in …

[PDF][PDF] Attribute based access control with trust calculation (ABAC-T) for decision policies of health Care in Pervasive Environment

G Abirami, R Venkataraman - IJITEE, 2019 - researchgate.net
Attribute Based Access Control (ABAC) provides a high degree of security in access control
mechanisms. Since ABAC is a fine-grained access control, it is being used wider in network …

Synchronization of processes in a distributed real time system exemplified by the control system of the fusion experiment WENDELSTEIN 7-X

J Schacht, H Laqua… - IEEE transactions on …, 2006 - ieeexplore.ieee.org
The fusion experiment Wendelstein 7-X demands synchronizing processes in many
distributed technical components with an accuracy from milliseconds to nanoseconds. For …

SPTP: a trust management protocol for online and ubiquitous systems

ID Addo, JJ Yang, SI Ahamed - 2014 IEEE 38th Annual …, 2014 - ieeexplore.ieee.org
With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy
and trust concerns surrounding the use of emerging technologies in the ensuing wake of the …

AISLE: Autonomic interface selection for wireless users

C Casetti, CF Chiasserini, R Fracchia… - … Symposium on a World …, 2006 - ieeexplore.ieee.org
We address the problem of wireless stations self-configuration in a WLAN environment with
overlapping access point coverages. We propose and investigate a transport-layer solution …

COM. PRIVACY: modelo para gerenciamento de evidências de proteção e privacidade de dados

GP Freund - 2022 - repositorio.ufsc.br
O universo digital proporcionou às organizações, privadas e públicas, o uso massivo de
dados pessoais e informações corporativas. Com isso, novos desafios surgiram no que se …

Designing human-centered collective intelligence

ID Addo - 2016 - search.proquest.com
Abstract Human-Centered Collective Intelligence (HCCI) is an emergent research area that
seeks to bring together major research areas like machine learning, statistical modeling …

Adaptive Reputation Weights Assignment Scheme for MANETs

MS Khan, I Ahmed, A Khan… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
To detect and isolate the misbehaving nodes in MANETs, reputation-based security
schemes have been developed. These schemes either utilize only first-hand (direct) …

[引用][C] Reference architectures for privacy preservation in cloud-based IoT applications

ID Addo, SI Ahamed, SS Yau, A Buduru - IJSC, 2014