A Survey on Trust Computation in the Internet of Things
暂无分享,去创建一个
Gyu Myoung Lee | Upul Jayasinghe | Tai-Won Um | Nguyen B. Truong | N. Truong | G. Lee | Tai-Won Um | Upul Jayasinghe
[1] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[2] S Hailes,et al. Using Recommendations for Managing Trust in Distributed Systems , 1997 .
[3] Marianne Winslett,et al. Interoperable strategies in automated trust negotiation , 2001, CCS '01.
[4] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[5] Tai-Myoung Chung,et al. Cluster-Based Trust Model against Attacks in Ad-Hoc Networks , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[6] James A. Hendler,et al. Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.
[7] Zheng Yan,et al. Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.
[8] Wolfgang Nejdl,et al. Personalized Reputation Management in P2P Networks , 2004, ISWC Workshop on Trust, Security, and Reputation on the Semantic Web.
[9] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[10] Timothy W. Finin,et al. A Policy Based Approach to Security for the Semantic Web , 2003, SEMWEB.
[11] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[12] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[13] Marianne Winslett,et al. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web , 2004, Secure Data Management.
[14] Christian Damsgaard Jensen,et al. Trust enhanced ubiquitous payment without too much privacy loss , 2004, SAC '04.
[15] Jaime Lloret,et al. Internet of things: where to be is to trust , 2012, EURASIP J. Wirel. Commun. Netw..
[16] Mehmet A. Orgun,et al. The prediction of trust rating based on the quality of services using fuzzy linear regression , 2011, 2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011).
[17] N. Truong,et al. A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .
[18] Lik Mui,et al. Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .
[19] Guido Barbian,et al. Trust Centrality in Online Social Networks , 2011, 2011 European Intelligence and Security Informatics Conference.
[20] Sergey Brin,et al. The Anatomy of a Search Engine , 2009 .
[21] Karl Aberer,et al. QoS-Based Service Selection and Ranking with Trust and Reputation Management , 2005, OTM Conferences.
[22] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[23] Mohan Kumar,et al. DTT: A Distributed Trust Toolkit for pervasive systems , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[24] Sean W. Smith,et al. Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.
[25] Munindar P. Singh,et al. An evidential model of distributed reputation management , 2002, AAMAS '02.
[26] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[27] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[28] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.
[29] Mogens Nielsen,et al. Towards a formal notion of trust , 2003, PPDP '03.
[30] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[31] Naima Iltaf,et al. An Effective Model for Indirect Trust Computation in Pervasive Computing Environment , 2014, Wirel. Pers. Commun..
[32] Eric Dubois,et al. Towards a Decision Model Based on Trust and Security Risk Management , 2009, AISC.
[33] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[34] Ling Liu,et al. A reputation-based trust model for peer-to-peer e-commerce communities , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[35] Ninghui Li,et al. DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.
[36] Peter Sewell,et al. Cassandra: distributed access control policies with tunable expressiveness , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[37] Azzedine Boukerche,et al. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[38] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..
[39] Azzedine Boukerche,et al. A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.
[40] Paolo Avesani,et al. Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.
[41] Fabien L. Gandon,et al. Semantic web technologies to reconcile privacy and context awareness , 2003, Journal of Web Semantics.
[42] Jia Guo,et al. Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[43] Sneha Kumar Kasera,et al. Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.
[44] Lei Li,et al. Price Trust Evaluation in E-service Oriented Applications , 2008, 2008 10th IEEE Conference on E-Commerce Technology and the Fifth IEEE Conference on Enterprise Computing, E-Commerce and E-Services.
[45] G. Zacharia. Collaborative reputation mechanisms for online communities , 1999 .
[46] F. Hussain. Trust and Reputation for Service-oriented Environments , 2006 .
[47] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[48] Munindar P. Singh,et al. Detecting deception in reputation management , 2003, AAMAS '03.
[49] Jennifer Golbeck,et al. Inferring Reputation on the Semantic Web , 2004, WWW 2004.
[50] Jordi Sabater-Mir,et al. Reputation and social network analysis in multi-agent systems , 2002, AAMAS '02.
[51] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[52] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[53] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[54] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[55] Marianne Winslett,et al. How to Exploit Ontologies for Trust Negotiation , 2004, Trust@ISWC.
[56] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[57] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[58] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[59] Jeffrey M. Bradshaw,et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[60] A. Rajaram,et al. A Trust Based Cross Layer Security Protocol for Mobile Ad hoc Networks , 2009, ArXiv.
[61] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[62] Tharam S. Dillon,et al. Fuzzy nature of trust and dynamic trust modeling in service oriented environments , 2005, SWS '05.
[63] Paul Resnick,et al. Reputation systems , 2000, CACM.
[64] Germano Caronni,et al. Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[65] Rukshan Athauda,et al. A holistic review on trust and reputation management systems for digital environments , 2012 .
[66] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[67] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[68] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[69] Ninghui Li,et al. RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[70] Vladimiro Sassone,et al. A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[71] G. Black,et al. Probabilities , 1875, The American journal of dental science.
[72] Marianne Winslett,et al. Policy migration for sensitive credentials in trust negotiation , 2003, WPES '03.
[73] Piero A. Bonatti,et al. Driving and monitoring provisional trust negotiation with metapolicies , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[74] Sungyoung Lee,et al. Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).
[75] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..