A fuzzy approach to trust based access control in internet of things

PN Mahalle, PA Thakre, NR Prasad… - Wireless VITAE …, 2013 - ieeexplore.ieee.org
In the Internet of thing (IoT), the activities of daily life are supported by a multitude of
heterogeneous, loosely coupled ubiquitous devices. Traditional access control model are …

Explaining the role of trust in cloud computing services

JK Adjei - info, 2015 - emerald.com
Purpose–The purpose of this paper is to explain the role of trust in cloud computing services
based on empirical evidence from interviewing executives of financial institutions in Ghana …

Anonymity and closely related terms in the cyberspace: An analysis by example

G Kambourakis - Journal of information security and applications, 2014 - Elsevier
Anonymity is generally conceived to be an integral part of user's right to privacy. Without
anonymity, many online activities would become prone to eavesdropping, making them …

[PDF][PDF] Understanding the Effect of Privacy Concerns on User Adoption of Identity Management Systems.

A Alkhalifah, S Al Amro - J. Comput., 2017 - jcomputers.us
Privacy concerns are one of the most important issues in today's technology-based setting.
Previous studies show that privacy concerns negatively influenced the individual's …

Explaining the role of trust in cloud service acquisition

JK Adjei - 2014 2nd IEEE International Conference on Mobile …, 2014 - ieeexplore.ieee.org
Effective digital identity management system is a critical enabler of cloud computing, since it
supports the provision of the required assurances to the transacting parties. Such …

Towards a trusted national identities framework

J Kwame Adjei - info, 2013 - emerald.com
Purpose–The aim of this paper is to present a qualitative study on implementation of trusted
identity management systems. Identity management and assurances in developing …

Reuse in software engineering: an object-oriented perspective

KS Rubin - 1990 Thirty-Fifth IEEE Computer Society International …, 1990 - computer.org
Effective digital identity management system is a critical enabler of cloud computing, since it
supports the provision of the required assurances to the transacting parties. Such …

A proposal to contribute to ITS standardization activity: A valuable network mobility management approach

N Toledo, M Higuero, M Huarte, J Matias… - Computer Standards & …, 2014 - Elsevier
The introduction of communication services in the demanding ITS scenarios strongly relies
on the existence of technologies that enable mobility and security. ITS related …

Application-layer design patterns for accountable–anonymous online identities

J Wolff - Telecommunications Policy, 2013 - Elsevier
Both anonymity and accountability play important roles in sustaining the Internet's
functionality; however, there is a common misconception that increasing the anonymity of …

The role of trust in the initial adoption of identity management systems

A Alkhalifah, J D'Ambra - … Information Systems: Proceedings of the 2012 …, 2013 - Springer
Trust plays a critical role in exchange relationships, including unknown risks in the online
environment. With respect to the adoption of identity management systems (IdMS), users …