Measuring trust in social networks based on linear uncertainty theory

Z Gong, H Wang, W Guo, Z Gong, G Wei - Information Sciences, 2020 - Elsevier
In social networks, trust relationships are the basis for interactions among decision nodes.
Trust relationships are subjective and dynamic, and there are only few sample data to …

Research on cloud computing service based on trust access control

P Sun - International Journal of Engineering Business …, 2020 - journals.sagepub.com
Recently, more and more network fraud incidents have damaged the interests of cloud
service traders. To enhance mutual trust and win–win cooperation between the users and …

RCBAC: A risk-aware content-based access control model for large-scale text data

K Ma, G Yang, Y Xiang - Journal of Network and Computer Applications, 2020 - Elsevier
Unstructured data (mostly text data) have become a vital part in the era of big data. Hence, it
has become increasingly difficult to identify the internal relations among data and describing …

Trust, security and privacy in emerging distributed systems

J Abawajy, G Wang, LT Yang, B Javadi - Future generation computer …, 2016 - Elsevier
The rapid development and increasing complexity of computer systems and communication
networks coupled with the proliferation of services and applications in both Internet-based …

Non-zero-sum cooperative access control game model with user trust and permission risk

N Helil, A Halik, K Rahman - Applied Mathematics and Computation, 2017 - Elsevier
In access control, there exists a game between an application system and its user, in which
both the system and the user try to maximize their own utility. Establishing a reasonable …

Known unknowns: Indeterminacy in authentication in IoT

M Heydari, A Mylonas, VHF Tafreshi… - Future Generation …, 2020 - Elsevier
Abstract The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an
enabling technology that can improve the quality of our daily lives, for instance by measuring …

A model of role-risk based intrusion prevention for cloud environment

WB Daoud, A Meddeb-Makhlouf… - 2018 14th international …, 2018 - ieeexplore.ieee.org
Cloud computing is a distributed and dynamic computing model that still has many
difficulties. Intrusion prevention based on access control is an essential research challenge …

RTBAC: A Risk‐Aware Topic‐Based Access Control Model for Text Data with Paragraph‐Level Authorization

K Ma, G Yang - Security and Communication Networks, 2022 - Wiley Online Library
Granting users precise access rights is one of the purposes of access control technologies.
With the increasing requirements of fine‐grained authorization, too strict or too loose access …

Practical personalized genomics in the encrypted domain

K Singh, R Sirdey, S Carpov - 2018 Third International …, 2018 - ieeexplore.ieee.org
In this paper, we examine and propose a solution for the challenges of sharing of genome
sequence data and of data querying on the genome sequence data on a cloud server in per …

Extended risk-based context-aware model for dynamic access control in bring your own device strategy

SO Ganiyu, RG Jimoh - Machine Learning and Data Mining for Emerging …, 2021 - Springer
The emergence of brings your own device (BYOD) strategy has brought considerable
benefits to enterprises. However, secure access control to vital enterprise resources is one …