Trust Provision in the Internet of Things using Transversal Blockchain Networks
暂无分享,去创建一个
Borja Bordel | Ramón Alcarria | Álvaro Sánchez-Picot | Diego Martín | R. Alcarria | Álvaro Sánchez-Picot | Borja Bordel | Diego Martín | Ramón Alcarria
[1] Frank Leymann,et al. Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More , 2005 .
[2] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[3] Jörg Daubert,et al. A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[4] Ramón Alcarria,et al. Enhancing Evacuation Plans with a Situation Awareness System Based on End-User Knowledge Provision , 2014, Sensors.
[5] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[6] Ramón Alcarria,et al. Detecting Malicious Components in Large-Scale Internet-of-Things Systems and Architectures , 2017, WorldCIST.
[7] David Evans,et al. Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[8] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[9] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[10] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[11] Antonio F. Gómez-Skarmeta,et al. Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet , 2013, Comput. Networks.
[12] Bin Zhao,et al. Dynamic trust evaluation in open networks , 2016, Intell. Autom. Soft Comput..
[13] Ning Zhang,et al. A solution to privacy-preserving two-party sign test on vertically partitioned data (P22NSTv) using data disguising techniques , 2010, 2010 International Conference on Networking and Information Technology.
[14] Z Shaikh,et al. Notice of Violation of IEEE Publication PrinciplesA Study on Secure Multiparty Computation Problems and Their Relevance , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.
[15] Peter Friess,et al. Internet of Things Strategic Research Roadmap , 2011 .
[16] Antonio F. Gómez-Skarmeta,et al. TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..
[17] Xiong Li,et al. Research on the Architecture of Trusted Security System Based on the Internet of Things , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.
[18] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[19] Ramón Alcarria,et al. Plug-and-Play Transducers in Cyber-Physical Systems for Device-Driven Applications , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
[20] Aaron Yelowitz,et al. Characteristics of Bitcoin users: an analysis of Google search data , 2014 .
[21] Hailong Feng,et al. Study of Recent Development about Privacy and Security of the Internet of Things , 2010, 2010 International Conference on Web Information Systems and Mining.
[22] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[23] Dong,et al. Attack Resistant Trust Management Model Based on Beta Function for Distributed Routing in Internet of Things , 2012 .
[24] Tao Liu,et al. A WSN-Oriented Key Agreement Protocol in Internet of Things , 2013 .
[25] Quan Zhou,et al. Trusted architecture for farmland wireless sensor networks , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.
[26] Antonio Iera,et al. A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[27] Tian Junfeng,et al. A kind of dynamic software behavior trust model based on improved subjective logic , 2016 .
[28] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[29] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[30] Borja Bordel,et al. Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things , 2017, Pervasive Mob. Comput..
[31] Ramón Alcarria,et al. Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[32] Miodrag Potkonjak,et al. Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[33] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[34] Louis Coetzee,et al. The Internet of Things - promise for the future? An introduction , 2011, 2011 IST-Africa Conference Proceedings.
[35] Lifeng Wang,et al. An innovative simulation environment for cross-domain policy enforcement , 2011, Simul. Model. Pract. Theory.
[36] Mari Carmen Domingo,et al. An overview of the internet of underwater things , 2012, J. Netw. Comput. Appl..
[37] Lv Tingjie,et al. Real-time business network selection based on auction mechanism , 2014, China Communications.
[38] Zhongchuan Fu,et al. A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks , 2011, Intell. Autom. Soft Comput..
[39] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[40] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[41] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[42] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[43] Muhammad Sabir Idrees,et al. HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems , 2013, Inf. Secur. Tech. Rep..
[44] Diego López-de-Ipiña,et al. Enabling Flexible and Continuous Capability Invocation in Mobile Prosumer Environments , 2012, Sensors.
[45] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[46] Félix Gómez Mármol,et al. Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..
[47] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[48] Bin Sun,et al. Trust management mechanism for Internet of Things , 2014 .