A Fuzzy Logic Based Trust-ABAC Model for the Internet of Things
暂无分享,去创建一个
[1] Jie Wu,et al. Collusion Attack Detection in Networked Systems , 2016, 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).
[2] Michael Blackstock,et al. IoT interoperability: A hub-based approach , 2014, 2014 International Conference on the Internet of Things (IOT).
[3] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[4] Patrice Clemente,et al. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system , 2014, Future Gener. Comput. Syst..
[5] Maria Rita Palattella,et al. Internet of Things in the 5G Era: Enablers, Architecture, and Business Models , 2016, IEEE Journal on Selected Areas in Communications.
[6] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[7] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[8] Chen Yuan,et al. Attribute Based Access Control (ABAC)-Based Cross-Domain Access Control in Service-Oriented Architecture (SOA) , 2012, 2012 International Conference on Computer Science and Service System.
[9] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[10] Guiran Chang,et al. Modeling access control for cyber-physical systems using reputation , 2012, Comput. Electr. Eng..
[11] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[12] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[13] Alessandro Armando,et al. Balancing Trust and Risk in Access Control , 2015, OTM Conferences.
[14] Matthias Jarke,et al. A Clustering Approach for Collaborative Filtering Recommendation Using Social Network Analysis , 2011, J. Univers. Comput. Sci..
[15] Junshan Li,et al. A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[16] Nadia Ben Azzouna,et al. Trust-ABAC Towards an Access Control System for the Internet of Things , 2017, GPC.
[17] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[18] Songjie Gong. A Collaborative Filtering Recommendation Algorithm Based on User Clustering and Item Clustering , 2010, J. Softw..
[19] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[20] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[21] Ma Jian-feng,et al. Research Status and Development Trends of Access Control Model , 2012 .
[22] Christos Faloutsos,et al. Epidemic thresholds in real networks , 2008, TSEC.
[23] Gerhard P. Hancke,et al. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.