Trust management of services in cloud environments: Obstacles and solutions

TH Noor, QZ Sheng, S Zeadally, J Yu - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Trust management is one of the most challenging issues in the emerging cloud computing
area. Over the past few years, many studies have proposed different techniques to address …

[HTML][HTML] A roadmap for security challenges in the Internet of Things

AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT)
context are playing an active role in human activities, systems and processes. The high …

A survey of trust in workflows and relevant contexts

W Viriyasitavat, A Martin - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …

Trust-based security for wireless ad hoc and sensor networks

A Boukerch, L Xu, K El-Khatib - Computer Communications, 2007 - Elsevier
Wireless sensors networks are susceptible to a large number of security threats, and
because of the communication, computation and delay constraints of most applications that …

Scheduling security-critical real-time applications on clusters

T Xie, X Qin - IEEE transactions on computers, 2006 - ieeexplore.ieee.org
Security-critical real-time applications such as military aircraft flight control systems have
mandatory security requirements in addition to stringent timing constraints. Conventional …

Access-control language for multidomain environments

JBD Joshi - IEEE Internet Computing, 2004 - ieeexplore.ieee.org
The XML role-based access control (X-RBAC) specification language addresses
multidomain environments' policy-specification needs. X-RBAC is based on an extension of …

Fr trust: a fuzzy reputation–based model for trust management in semantic p2p grids

S Javanmardi, M Shojafar… - … Journal of Grid and …, 2015 - inderscienceonline.com
A P2P grid is a special case of grid networks in which P2P communications are used for
communication between nodes and trust management. This technology allows creation of a …

Fuzzy trust integration for security enforcement in grid computing

S Song, K Hwang, M Macwan - … , NPC 2004, Wuhan, China, October 18-20 …, 2004 - Springer
How to build the mutual trust among Grid resources sites is crucial to secure distributed Grid
applications. We suggest enhancing the trust index of resource sites by upgrading their …

[图书][B] Hyperspectral image processing

L Wang, C Zhao - 2016 - Springer
With the rapid development of the modern science and technology, the hyperspectral remote
sensing science, as a comprehensive high and new technology, has gained the extensive …

[PDF][PDF] 可信网络中一种基于行为信任预测的博弈控制机制

田立勤, 林闯 - 2007 - cjc.ict.ac.cn
摘要近年来, 网络可信的研究已成为一个研究热点, 其中用户的行为信任研究是网络可信研究的
重要内容之一. 由于用户行为信任的评估是基于过去交往的行为证据之上 …