STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment
暂无分享,去创建一个
[1] Tao Sun,et al. Probabilistic Trust Management in Pervasive Computing , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[2] Christian Damsgaard Jensen,et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .
[3] Paddy Nixon,et al. Trusting Collaboration in Global Computing Systems , 2003, iTrust.
[4] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[5] Paddy Nixon,et al. Security models for trusting network appliances , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.
[6] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[7] Jianping Hu,et al. A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[8] Munindar P. Singh,et al. An adaptive probabilistic trust model and its evaluation , 2008, AAMAS.
[9] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[10] M. Lynn. Hawaii International Conference on System Sciences , 1996 .
[11] Michel Riguidel,et al. Adjustable Trust Model for Access Control , 2008, ATC.
[12] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[13] Young-Koo Lee,et al. A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).
[14] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[15] Emil C. Lupu,et al. Security and management policy specification , 2002, IEEE Netw..
[16] Sheikh Iqbal Ahamed,et al. A trust-based secure service discovery (TSSD) model for pervasive computing , 2008, Comput. Commun..
[17] Sheikh Iqbal Ahamed,et al. Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..
[18] Andrés Marín López,et al. Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[19] Vijay Varadharajan,et al. Interaction Trust Evaluation in Decentralized Environments , 2004, EC-Web.
[20] Andrés Marín López,et al. Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.
[21] Andrés Marín López,et al. TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.
[22] Elisa Bertino,et al. A Trust-Based Context-Aware Access Control Model for Web-Services , 2004, Proceedings. IEEE International Conference on Web Services, 2004..
[23] Sheikh Iqbal Ahamed,et al. An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).
[24] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[25] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[26] Timothy W. Finin,et al. Vigil: Enforcing Security in Ubiquitous Environments , 2002 .
[27] David M. Eyers,et al. Using trust and risk in role-based access control policies , 2004, SACMAT '04.
[28] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.