Trust management in ubiquitous computing: A Bayesian approach

MK Denko, T Sun, I Woungang - Computer Communications, 2011 - Elsevier
Designing a trust management scheme that can effectively evaluate the relationships among
devices in pervasive computing environments is a challenging task. This paper continues …

[PDF][PDF] Security threats and countermeasures in cloud computing

V Ashktorab, SR Taghizadeh - International Journal of …, 2012 - researchgate.net
Security concerns have given rise to immerging an active area of research due to the many
security threats that many organizations have faced at present. Addressing these issues …

Novel trust based energy aware routing mechanism for mitigation of black hole attacks in MANET

RT Merlin, R Ravi - Wireless Personal Communications, 2019 - Springer
The open transmission characteristics in wireless environments and scarce energy
resources generated many challenging factors in MANET's. Presently, MANET's are highly …

Trust management model based on fuzzy approach for ubiquitous computing

NA Mhetre, AV Deshpande… - International Journal of …, 2016 - igi-global.com
The current state of ubiquitous computing has been greatly influenced by emerging
networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust …

Comparative trust management with applications: Bayesian approaches emphasis

K Thirunarayan, P Anantharam, C Henson… - Future Generation …, 2014 - Elsevier
Trust relationships occur naturally in many diverse contexts such as collaborative systems, e-
commerce, interpersonal interactions, social networks, and semantic sensor web. As agents …

Networked TT&C for mega satellite constellations: A security perspective

Y Zhan, G Zeng, X Pan - China Communications, 2022 - ieeexplore.ieee.org
Satellite constellations are promising in enabling the global Internet. However, the
increasing constellation size also complicates tracking, telemetry and command (TT&C) …

[图书][B] Identity management for internet of things

PN Mahalle, PN Railkar - 2022 - taylorfrancis.com
The Internet of Things is a wide-reaching network of devices, and these devices can
intercommunicate and collaborate with each other to produce variety of services at any time …

[PDF][PDF] Security issues in cloud computing: A survey

R Shaikh, M Sasikumar - International Journal of Computer Applications, 2012 - Citeseer
Cloud computing is attracting great attention nowadays. The elastic nature of cloud makes it
suitable for almost any type of organization. The major challenge faced by cloud users and …

Trust management model for cloud computing environment

SK Prajapati, S Changder, A Sarkar - arXiv preprint arXiv:1304.5313, 2013 - arxiv.org
Software as a service or (SaaS) is a new software development and deployment paradigm
over the cloud and offers Information Technology services dynamically as" on-demand" …

A mechanism for detecting dishonest recommendation in indirect trust computation

N Iltaf, A Ghafoor, U Zia - EURASIP Journal on Wireless Communications …, 2013 - Springer
Indirect trust computation based on recommendations form an important component in trust-
based access control models for pervasive environment. It can provide the service provider …