Trust Management in Fog Computing
暂无分享,去创建一个
[1] S. Challa,et al. Trust Management in Wireless Sensor Networks , 2007 .
[2] Abderrazak Jemai,et al. A survey on security of IoT in the context of eHealth and clouds , 2016, 2016 11th International Design & Test Symposium (IDT).
[3] S. Buchegger,et al. A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .
[4] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[5] Pablo Chacin,et al. A New Era for Cities with Fog Computing , 2017, IEEE Internet Computing.
[6] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[7] Antonio Pescapè,et al. On the Integration of Cloud Computing and Internet of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.
[8] Manju Khari,et al. Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network , 2011 .
[9] Gyu Myoung Lee,et al. Autonomic trust management in cloud-based and highly dynamic IoT applications , 2015, 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015).
[10] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[11] Ananthram Swami,et al. LogitTrust : A Logit Regression-based Trust Model for Mobile Ad Hoc Networks , 2014 .
[12] Michael I. Hill,et al. Generalizeability of Latency Detection in a Variety of Virtual Environments , 2004 .
[13] João H. Kleinschmidt,et al. Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.
[14] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[15] Samer Salam,et al. Internet of Things From Hype to Reality , 2017 .
[16] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[17] Qun Li,et al. Security and Privacy Issues of Fog Computing: A Survey , 2015, WASA.
[18] Hua Wang,et al. Trust-Based Access Control for Privacy Protection in Collaborative Environment , 2009, 2009 IEEE International Conference on e-Business Engineering.
[19] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..
[20] Li Ma,et al. A hierarchical trust model for cluster-based wireless sensor network , 2015, 2015 International Conference on Control, Automation and Information Sciences (ICCAIS).
[21] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[22] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[23] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[24] Peter Herrmann,et al. How to Secure Internet of Things Devices in an Energy Efficient Way , 2017, ERCIM News.
[25] Svein J. Knapskog,et al. A metric for trusted systems , 1998 .
[26] Antonio Iera,et al. SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.
[27] Mario Nemirovsky,et al. Key ingredients in an IoT recipe: Fog Computing, Cloud computing, and more Fog Computing , 2014, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[28] Minming Ni,et al. Seamless handover for high mobility environments , 2016, 2016 International Wireless Communications and Mobile Computing Conference (IWCMC).
[29] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[30] Mahadev Satyanarayanan,et al. Towards wearable cognitive assistance , 2014, MobiSys.
[31] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[32] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[33] Robert P. Minch,et al. Privacy issues in location-aware mobile devices , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[34] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[35] Hui Xia,et al. Node Trust Assessment and Prediction in Mobile Ad Hoc Networks , 2015 .
[36] Dongqi Fu,et al. Blockchain-based trusted computing in social network , 2016, 2016 2nd IEEE International Conference on Computer and Communications (ICCC).
[37] Alia I. Abdelmoty,et al. Towards Location Privacy Awareness on Geo-Social Networks , 2016, 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST).
[38] Claudia Keser,et al. Can We Manage Trust? , 2005, iTrust.
[39] David Palma,et al. Fog Computing in Healthcare–A Review and Discussion , 2017, IEEE Access.
[40] Vipin Swarup,et al. Trust: Benefits, Models, and Mechanisms , 2001, Secure Internet Programming.
[41] Michael B. Lewis,et al. Face Detection: Mapping Human Performance , 2003, Perception.
[42] Karthik Thyagarajan Iyer. Computational complexity of data mining algorithms used in fraud detection , 2015 .
[43] Edna Dias Canedo,et al. Trust model for private cloud , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[44] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.