Group-based trust management scheme for clustered wireless sensor networks

RA Shaikh, H Jameel, BJ d'Auriol, H Lee… - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Traditional trust management schemes developed for wired and wireless ad hoc networks
are not well suited for sensor networks due to their higher consumption of resources such as …

A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems

T Xiaoyong, K Li, Z Zeng… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In the recent past, security-sensitive applications, such as electronic transaction processing
systems, stock quote update systems, which require high quality of security to guarantee …

On the trust and trust modeling for the future fully-connected digital world: A comprehensive study

HLJ Ting, X Kang, T Li, H Wang, CK Chu - IEEE Access, 2021 - ieeexplore.ieee.org
With the fast development of digital technologies, we are running into a digital world. The
relationship among people and the connections among things become more and more …

A novel trust management framework for multi-cloud environments based on trust service providers

W Fan, H Perros - Knowledge-Based Systems, 2014 - Elsevier
In this paper, we address the problem of trust management in multi-cloud environments
based on a set of distributed Trust Service Providers (TSPs). These are independent third …

MTBAC: A mutual trust based access control model in cloud computing

G Lin, D Wang, Y Bie, M Lei - China Communications, 2014 - ieeexplore.ieee.org
As a new computing mode, cloud computing can provide users with virtualized and scalable
web services, which faced with serious security challenges, however. Access control is one …

A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach

WJ Fan, SL Yang, H Perros, J Pei - International Journal of Automation and …, 2015 - Springer
In the last few years, cloud computing as a new computing paradigm has gone through
significant development, but it is also facing many problems. One of them is the cloud …

Trust quantification for networked cyber-physical systems

Y Wang - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Cyber-physical systems (CPS) are highly integrated hardware-software devices that electro-
mechanical components are tightly coupled with advanced computational algorithms for …

A comprehensive overview on application of trust and reputation in wireless sensor network

GEP Kumar, I Titus, SI Thekkekara - Procedia Engineering, 2012 - Elsevier
Trust is being deployed along side with cryptography in WSN to achieve better security. This
paper describes about how the various systems that are designed to act against attacks with …

Enforcing access control using risk assessment

NN Diep, LX Hung, Y Zhung, S Lee… - … Networks (ECUMN'07 …, 2007 - ieeexplore.ieee.org
Context-based access control is an emerging approach for modeling adaptive solution,
making access control management more flexible and powerful. But in the ubiquitous …

[引用][C] 大规模分布式环境下动态信任模型研究

李小勇, 桂小林 - 2007