Modeling access control for cyber-physical systems using reputation
暂无分享,去创建一个
Guiran Chang | Jie Jia | Xingwei Wang | Dong Chen | Dawei Sun | Jie Jia | Dawei Sun | G. Chang | Xingwei Wang | Dong Chen
[1] Indrajit Ray,et al. TrustBAC: integrating trust relationships into the RBAC model for access control in open systems , 2006, SACMAT '06.
[2] Yuguang Fang,et al. Access control in wireless sensor networks , 2007, Ad Hoc Networks.
[3] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[4] Radha Poovendran,et al. Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] , 2010, Proc. IEEE.
[5] Yan Lindsay Sun,et al. Trust Establishment in Distributed Networks: Analysis and Modeling , 2007, 2007 IEEE International Conference on Communications.
[6] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[7] David E. Culler,et al. Extending IP to Low-Power, Wireless Personal Area Networks , 2008, IEEE Internet Computing.
[8] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[9] Cristina Alcaraz,et al. Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..
[10] Isaac Woungang. Wireless ad hoc, sensor and mesh networks , 2010, Comput. Electr. Eng..
[11] Alagan Anpalagan,et al. A detailed review of energy-efficient medium access control protocols for mobile sensor networks , 2010, Comput. Electr. Eng..
[12] Inhyok Cha,et al. Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.
[13] Xu Li,et al. An agent-based trust and reputation management scheme for wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[14] Bharat K. Bhargava,et al. A role-based access in a hierarchical sensor network architecture to provide multilevel security , 2008, Comput. Commun..
[15] Ma Jian-feng,et al. An Access Control Scheme in Wireless Sensor Networks , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[16] Wayne H. Wolf,et al. Cyber-physical Systems , 2009, Computer.
[17] Nicolae Vizireanu,et al. Generalizations of binary morphological shape decomposition , 2007, J. Electronic Imaging.
[18] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2009, IEEE INFOCOM 2009.
[19] Nicolae Vizireanu,et al. Morphological shape decomposition interframe interpolation method , 2008, J. Electronic Imaging.
[20] Radu Mihnea Udrea,et al. Visual-oriented morphological foreground content grayscale frames interpolation method , 2009, J. Electronic Imaging.
[21] Jiming Chen,et al. An optimal control method for applications using wireless sensor/actuator networks , 2009, Comput. Electr. Eng..
[22] Benjamin K. S. Khoo,et al. RFID- from Tracking to the Internet of Things: A Review of Developments , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[23] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[24] S. Shankar Sastry,et al. Secure Control: Towards Survivable Cyber-Physical Systems , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[25] Zhu Han,et al. Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[26] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[27] Siu-Ming Yiu,et al. Security Issues and Challenges for Cyber Physical System , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[28] Simona Halunga,et al. Morphological skeleton decomposition interframe interpolation method , 2010, J. Electronic Imaging.
[29] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[30] Radu Mihnea Udrea,et al. Iterative generalization of morphological skeleton , 2007, J. Electronic Imaging.