A trustworthy access control model for mobile cloud computing based on reputation and mechanism design
暂无分享,去创建一个
Li Xu | Hui Lin | Xinyi Huang | Wei Wu | Yijie Huang | Wei Wu | Xinyi Huang | Li Xu | Hui Lin | Yijie Huang
[1] Fatos Xhafa,et al. An efficient PHR service system supporting fuzzy keyword search and fine-grained access control , 2013, Soft Computing.
[2] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[3] ParkSang Oh,et al. Trust management on user behavioral patterns for a mobile cloud computing , 2013 .
[4] Hu,et al. SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks , 2012 .
[5] Robert H. Deng,et al. Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.
[6] Raouf Boutaba,et al. Routing protocols in wireless mesh networks: challenges and design considerations , 2006, Multimedia Tools and Applications.
[7] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[8] Hui Lin,et al. PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks , 2012, EURASIP J. Wirel. Commun. Netw..
[9] Min Chen,et al. Security protection between users and the mobile media cloud , 2014, IEEE Communications Magazine.
[10] Vipin Kumar,et al. Trends in big data analytics , 2014, J. Parallel Distributed Comput..
[11] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[12] Mucheol Kim,et al. Trust management on user behavioral patterns for a mobile cloud computing , 2013, Cluster Computing.
[13] Antonio Capone,et al. EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants , 2011, 2011 Proceedings IEEE INFOCOM.
[14] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[15] Junho Choi,et al. Ontology-based access control model for security policy reasoning in cloud computing , 2013, The Journal of Supercomputing.
[16] Jinjun Chen,et al. Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates , 2014, IEEE Transactions on Parallel and Distributed Systems.
[17] Junbeom Hur,et al. Improving Security and Efficiency in Attribute-Based Data Sharing , 2013, IEEE Transactions on Knowledge and Data Engineering.
[18] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[19] Vijay Varadharajan,et al. Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage , 2013, IEEE Transactions on Information Forensics and Security.
[20] Li Xu,et al. A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks , 2013, Wireless Personal Communications.
[21] Li Xu,et al. A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing , 2015, Future Gener. Comput. Syst..
[22] Ahmed Hammam,et al. A trust management system for ad-hoc mobile clouds , 2013, 2013 8th International Conference on Computer Engineering & Systems (ICCES).
[23] Weijia Jia,et al. A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing , 2013, CSS.
[24] Mihaela van der Schaar,et al. Incentive Provision and Job Allocation in Social Cloud Systems , 2013, IEEE Journal on Selected Areas in Communications.
[25] Vasil Hnatyshin,et al. The Practical OPNET User Guide for Computer Network Simulation , 2012 .
[26] Wei Zhou,et al. A strategy-proof trust mechanism for pervasive computing environments , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[27] Haiying Shen,et al. An Efficient and Trustworthy Resource Sharing Platform for Collaborative Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[28] Vijay Varadharajan,et al. Secure administration of cryptographic role-based access control for large-scale cloud storage systems , 2014, J. Comput. Syst. Sci..
[29] Zhu Han,et al. Truthful Mechanisms for Secure Communication in Wireless Cooperative System , 2013, IEEE Transactions on Wireless Communications.
[30] Yong Zhang,et al. A novel reputation computation model based on subjective logic for mobile ad hoc networks , 2011, Future Gener. Comput. Syst..
[31] Raymond K. Wong,et al. Decentralized Trust Driven Access Control for Mobile Content Sharing , 2013, 2013 IEEE International Congress on Big Data.