[PDF][PDF] Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs.

A Kumar, K Gopal, A Aggarwal - Int. J. Netw. Secur., 2016 - core.ac.uk
Lightweight trust mechanism with lightweight cryptography primitives and post-quantum
cryptosystems are having important concerns in resource constraint wireless sensor based …

Setting access permission through transitive relationship in web-based social networks

D Hong, VY Shen - Weaving Services and People on the World Wide Web, 2009 - Springer
The rising popularity of various social networking websites has created a huge problem on
Internet privacy. Although it is easy to post photos, comments, opinions on some events, etc …

Privacy in a semantic cloud: What's trust got to do with it?

ÅA Nyre, MG Jaatun - IEEE International Conference on Cloud Computing, 2009 - Springer
The semantic web can benefit from cloud computing as a platform, but for semantic
technologies to gain wide adoption, a solution to the privacy challenges of the cloud is …

Misbehaviors detection to ensure availability in OLSR

F Cuppens, N Cuppens-Boulahia, T Ramard… - Mobile Ad-Hoc and …, 2007 - Springer
In this paper, we investigate the use of Aspect-Oriented Programming (AOP)[13] in the
domain of Mobile Ad-hoc NETworks (MANETs). More precisely we study the availability …

Towards a Context-Aware and Adaptable Room System for Intelligent" Trusted" Office-Spaces in Smart Cities

T French, N Bessis - … Innovative Mobile and Internet Services in …, 2012 - ieeexplore.ieee.org
This visionary paper outlines a future intelligent building office space room system that
seeks to ensure that the users of a rent able and/or shared office space do not perform …

Trust issues on crowd-sourcing methods for urban environmental monitoring

T French, N Bessis, C Maple… - International Journal of …, 2012 - igi-global.com
This paper explores trust related issues arising from the use of a crowd-sourcing method.
Crowd-sourcing is a relatively new method that utilises modern technologies to gather …

A robust reputation scheme for decentralized group management systems

F Cuppens, N Cuppens-Boulahia… - … Conference on Information …, 2008 - Springer
In the literature, reputation systems are used to evaluate other entities behavior and have
many applications such as, for instance, the detection of malicious entities. The associated …

Lightweight trust propagation scheme for resource constraint mobile ad-hoc networks (MANETs)

A Kumar, K Gopal, A Aggarwal - 2013 Sixth International …, 2013 - ieeexplore.ieee.org
This work presents a new lightweight trust propagation scheme in an ad hoc network. To
accommodate the new nodes in subgroups, lightweight vibration mechanism is integrated …

Modelling self-led trust value management in grid and service oriented infrastructures: a graph theoretic social network mediated approach

A Brown, P Sant, N Bessis, T French… - International Journal of …, 2010 - igi-global.com
Current developments in grid and service oriented technologies involve fluid and dynamic,
ad hoc based interactions between delegates, which in turn, serves to challenge …

Trust Propagation Model for Federated Virtual Commnunities

S Peng, J Het, F Dai - 2008 International Symposium on …, 2008 - ieeexplore.ieee.org
Trust management is a new security technology for computer networks. A virtual community
(VC) is a trust domain. In trust management, trust propagation is crucial within a VC …