Filters








14,524 Hits in 5.4 sec

A Scalable Evidence Based Self-Managing Framework for Trust Management

Mohammad Waseem Hassan, Richard McClatchey, Ian Willers
2007 Electronical Notes in Theoretical Computer Science  
This paper presents the design of a large-scale, self-managing Trust Management Framework (TMF) that makes efficient use of apparently invisible evidences that are scattered across potentially global networks  ...  The TMF's design dictates a layered architecture for capturing evidence at the data layer of a network, transforming it into formed reputations in the information layer and utilizing these reputations  ...  In this paper the design of a largescale, self-managing Trust Management Framework (TMF) has been presented.  ... 
doi:10.1016/j.entcs.2006.08.031 fatcat:xldbtzwenrg5xmzlm4azk2m36y

Autonomic Trust Management in Cloud-Based and Highly Dynamic IOT Applications

Suneth Namal, Hasindu Gamaarachchi, Gyu Myoung Lee, Tai-Won Um
2016 Journal of International Business Research and Marketing  
In this paper, we propose an autonomic trust management framework for cloud based and highly dynamic Internet of Things (IoT) applications and services.  ...  On this basis, we came up with an autonomic trust management framework based on MAPE-K feedback control loop to evaluate the level of trust.  ...  [19] have introduced a framework for trust management in cloud environments called Trust as a Service.  ... 
doi:10.18775/jibrm.1849-8558.2015.15.3004 fatcat:zwmntbz5xrcmtp2fcjt3d6b7ky

Effective Handling of Reputation-Based Trust Management in Cloud Environment

2017 International Journal of Science and Research (IJSR)  
Trust management is a standout amongst the most difficult issue for the tackling and development of cloud computing.  ...  In this article, we elaborate the design as well as implementation of Cloud Armor, a reputation-based trust management system which provides an arrangement of functionalities to deliver Trust as a Service  ...  formal framework The detection of reputation Reputation attacks detection for effective trust assessment of cloud services trust management techniques based on feedback Framework gives accountability  ... 
doi:10.21275/art20164294 fatcat:h673647kgjajpd6zwonlp5ugru

A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data

Komal Gilani, Emmanuel Bertin, Julien Hatin, Noel Crespi
2020 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)  
Firstly, we discussed an overview of Identity management approaches, introducing an architecture overview as well as the relevant actors in such a system and blockchain technology as solution for distributed  ...  In this paper, we provide a coherent view of the central concepts of SSI, including the components of identity proofing and authentication solutions for different SSI solutions.  ...  A framework is proposed for [28] trust information at the identity holder as assertion as well as attribute level according to Identity, Credential & Access Management (ICAM) standard.  ... 
doi:10.1109/brains49436.2020.9223312 dblp:conf/brains/GilaniBHC20 fatcat:bqud3palbncrxetmx7g444qrk4

Evaluation Theory for Characteristics of Cloud Identity Trust Framework [chapter]

Eghbal Ghazizadeh, Brian Cusack
2019 Cloud Computing - Technology and Practices  
A Trust model acts as a security strength evaluator and ranking service for the cloud and cloud identity applications and services.  ...  Trust management is a prominent area of security in cloud computing because insufficient trust management hinders cloud growth.  ...  Framework have been systematically categorized as a proposed trust models on the basis of their diverse attributes and techniques for calculating the trust score as a source of evidences and Figure 3  ... 
doi:10.5772/intechopen.76338 fatcat:v2bhn67cend7jjzqbgiykqcqw4

Universal Identity and Access Management Framework for Future Ecosystems

Daniela Pöhn, Wolfgang Hommel
2021 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Based on a motivating scenario, different requirements are mapped with identity management models and approaches within.  ...  In order to gain an overview and to enable interoperability, this article proposes an identity and access management framework (IAMF).  ...  Therefore, norms and standards provide a comprehensive base for security management, accountability, and liability as well as trust.  ... 
doi:10.22667/jowua.2021.03.31.064 dblp:journals/jowua/PohnH21 fatcat:v45tv7qbf5a4xmdamzmjw6mv4y

Modeling Trust Management among Cloud Entities

Akanksha Bali, Malvika Ashok, Mohammed Sarfaraz
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Conner et al proposed a framework for trust evaluation system for decentralized network.  ...  Through this paper a trust evaluation model has been devised based on the evidence. The evidence is based on the interaction and uses the rule of Dempster-Shafer.  ...  Through this paper we have implemented a evidence based implementation model for cloud computing environment.  ... 
doi:10.23956/ijarcsse/v7i3/0117 fatcat:5b52bw4corb6nnupltihw24jti

Trust in the Cloud

Imad M. Abbadi, Andrew Martin
2011 Information Security Technical Report  
Central to this concern is that the user should be provided with evidence of the trustworthiness of the elements of the Cloud.  ...  These trust models are not only beneficial to a Cloud's users, but also to Cloud providers, collaborating Clouds-of-Clouds, and external auditors.  ...  Trust in Adaptability as a self-managed service should also be considered as an important factor.  ... 
doi:10.1016/j.istr.2011.08.006 fatcat:ieabvxiia5fzpcihtdgwvehgvm

Blockchain for Trust and Reputation Management in Cyber-physical Systems [article]

Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak
2021 arXiv   pre-print
The salient features of blockchain, such as decentralisation and transparency, have allowed the development of Decentralised Trust and Reputation Management Systems (DTRMS), which mainly aim to quantitatively  ...  In addition, we also outline challenges and future directions in developing DTRMS for CPS.  ...  In [17] , the authors proposed TrustChain, a three layered trust management framework tailored for supply chains.  ... 
arXiv:2109.07721v1 fatcat:qw27quabmrebnint776yye2cwe

A Survey on Trust Management for Mobile Ad Hoc Networks

Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen
2011 IEEE Communications Surveys and Tutorials  
We provide a survey of trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance metrics, and trust metrics in MANETs.  ...  Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system goals such as reliability, availability, scalability  ...  Watson Research Center for their valuable comments.  ... 
doi:10.1109/surv.2011.092110.00088 fatcat:nyo4a33trjh35ajvqlwlovomt4

An associative processing module for a heterogeneous vision architecture

R. Storer, M.R. Pout, A.R. Thomson, E.L. Dagless, A.W.G. Duller, A.P. Marriott, P.J. Hicks
1992 IEEE Micro  
We provide a survey of trust management schemes developed for MANETs and discuss generally accepted classifications, potential attacks, performance metrics, and trust metrics in MANETs.  ...  Managing trust in a distributed Mobile Ad Hoc Network (MANET) is challenging when collaboration or cooperation is critical to achieving mission and system goals such as reliability, availability, scalability  ...  Watson Research Center for their valuable comments.  ... 
doi:10.1109/40.141602 fatcat:gk6w4la6zrb4jhaqtbieoytnzi

Towards Management Of Chains Of Trust For Multi-Clouds With Intel Sgx

Houssem Kanzari, Marc Lacoste
2016 Zenodo  
This paper is a first step towards reconciling the two standpoints towards a broader trust management framework.  ...  We propose a protocol for establishing trust between a chain of Intel SGX enclaves, both when they are located on the same and on remote platforms.  ...  Future work includes: (1) extending our framework to manage CoT vertically across infrastructure layers; and (2) integration with a security self-management framework for distributed clouds.  ... 
doi:10.5281/zenodo.58681 fatcat:lrgfqqhiyjfgjfcmhn5xhyv2by

Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review [article]

Raghu Vamsi. P, Krishna Kant
2014 arXiv   pre-print
In this paper, we attempt to present steps for a systematic design of trust management systems for WSNs. In addition, we address the techniques followed by scholars in implementing trust frameworks.  ...  In recent years, numerous researchers have proposed wide variety of solutions based on trust. However, all these solutions carry their own design.  ...  Ant based adaptive trust model, a bio-inspired model based on swarm intelligence is proposed in [30] . It is a reactive evidence distribution scheme.  ... 
arXiv:1406.3204v2 fatcat:z2gdqcywwbgtla4ojysyagv2fm

Smart Grid: a demanding use case for 5G technologies

Helen C. Leligou, Theodore Zahariadis, Lambros Sarakis, Eleftherios Tsampasis, Artemis Voulkidis, Terpsichori E. Velivassaki
2018 Zenodo  
To face these issues, we outline a novel 5G PPP-compliant software framework specifically tailored to the energy domain, which combines i)trusted, scalable and lock-in free plug 'n' play support for a  ...  a variety of applications(stringent capacity for smart metering/AMI versus latency for supervisory control and fault localization).  ...  So, we propose to leverage the H2020 SUCCESS unbundled smart meter architecture and introduce a scalable cloud-based stack, optional multi-RAT access interface and enriched security and trust features,  ... 
doi:10.5281/zenodo.2600324 fatcat:xxdqe5jwinegbapqcuw25qfnxq

A Survey on Detecting Selfish Nodes in Wireless Sensor Networks Using Different Trust Methodologies

Dr.ArunKorath Dr.ArunKorath, Vineeth K.V Vineeth K.V
2011 Indian Journal Of Applied Research  
Riaz et al [26] proposes a group based trust management scheme for clustered wsn where a new lightweight protocol been developed.  ...  TRUST BASED ON QOS SOCIAL NETWORK There are many trust work based on Qos and social networks. [25] Proposed a trust management scheme based on location verification where the security of geographic routing  ... 
doi:10.15373/2249555x/jan2014/58 fatcat:d5veyliyhnf3de4kvnbvi3a6ru
« Previous Showing results 1 — 15 out of 14,524 results