8,849 Hits in 4.9 sec

IEEE Access Special Section Editorial: Trust Management in Pervasive Social Networking (TruPSN)

Zheng Yan, Honggang Wang, Laurence T. Yang, Valtteri Niemi
2018 IEEE Access  
In the article ''Secure pervasive social communications based on trust in a distributed way'', Huang et al. proposed two schemes to secure communication data in PSN purely based on local trust evaluated  ...  based on online social networks.  ... 
doi:10.1109/access.2018.2817858 fatcat:ib2iqtxfcnaipbdacmldhupbxu

Closed-Loop Feedback Computation Model of Dynamical Reputation Based on the Local Trust Evaluation in Business-to-Consumer E-Commerce

Bo Tian, Jingti Han, Kecheng Liu
2016 Information  
A logical model of trust and reputation is established based on the analysis of the dynamical relationship between trust and reputation.  ...  Trust and reputation are important factors that influence the success of both traditional transactions in physical social networks and modern e-commerce in virtual Internet environments.  ...  Bo Tian carried out a literature survey, proposed the trust and reputation computation system, and wrote the paper.  ... 
doi:10.3390/info7010004 fatcat:xec3uxhlpfclxieesmlw3pr6y4

Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE

Ning Li, Zheng Yan, Mingjun Wang, Laurence T. Yang
2018 ACM Transactions on Cyber-Physical Systems  
Pervasive Social Networking (PSN) intends to support instant social activities in a pervasive way at anytime and anywhere.  ...  GT is evaluated by a Trusted Server (TS) based on historically accumulated social networking information; LT evaluated by PSN nodes based on locally collected information in social interactions.  ...  CONCLUSIONS In this paper, we presented a scheme to secure communication data in PSN based on the general trust and/or the local trust in a flexible manner by applying KP-ABE.  ... 
doi:10.1145/3145624 fatcat:xrgcfckpjbgtbjiwypuqce4ba4

Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence

Marco Conti, Sajal K. Das, Chatschik Bisdikian, Mohan Kumar, Lionel M. Ni, Andrea Passarella, George Roussos, Gerhard Tröster, Gene Tsudik, Franco Zambonelli
2012 Pervasive and Mobile Computing  
Alongside, a new wave of (human) social networks and structures are emerging as important drivers for the development of novel communication and computing paradigms.  ...  Information flows from the physical to the cyber world, and vice-versa, adapting the converged world to human behavior and social dynamics.  ...  Additional challenges related to pervasive computing at scale were discussed at the National Science Foundation's PeCS workshop [121].  ... 
doi:10.1016/j.pmcj.2011.10.001 fatcat:xgqhx3xumnboflg72vhoe4sbui

IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management

Yulei Wu, Zheng Yan, Kim-Kwang Raymond Choo, Laurence T. Yang
2019 IEEE Access  
learning-based research efforts in pairwise trust prediction in the context of social networking.  ...  MACHINE LEARNING-BASED APPROACHES In the article entitled ''Predict pairwise trust based on machine learning in online social networks: a survey, '' Liu, et al., presented an overview of existing machine  ... 
doi:10.1109/access.2019.2915489 fatcat:duhaq23h2rbejboby3hhxvnzse

Cluster Node Migration Oriented Holistic Trust Management Protocol for Ubiquitous and Pervasive IoT Network

Anup Patnaik, Banitamani Mallik, M. Vamsi Krishna
2021 Journal of Information Technology Management  
Unless security considerations are analyzed and implemented properly in real time then IoT cannot be perceived as a pervasive network for the possible stakeholders.  ...  of their nodes if falls below the defined Zone trust threshold level.  ...  Trustworthiness of device in Tragos et al. (2016) calculated based on different criteria such as communication-based trust, Security-based Trust, Data-Reliability based Trust, Social Relationship based  ... 
doi:10.22059/jitm.2021.80027 doaj:ddd7fb68f9914c01ad57da1f753da7c4 fatcat:4xxh5h5z7jfxhohocptjxbzb6e

Hierarchical Trust Level Evaluation for Pervasive Social Networking

Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, Xiong Li
2017 IEEE Access  
INDEX TERMS Pervasive social networking (PSN), trust evaluation, secure communication, hierarchical trust level (HTL).  ...  Pervasive social networking (PSN) is a fundamental infrastructure in social networking that has played an important role in not only the Internet but also mobile domains.  ...  Based on the framework in [11] , secure PSN with two-dimensional levels is realized. Many works exist on trust management and secure PSN [25] - [28] .  ... 
doi:10.1109/access.2017.2652486 fatcat:x5bckkr5hfcfngjtb7gnbtrpwq

Threat Modeling Approaches for Securing Cloud Computin

A. Amini, N. Jamil, A.R. Ahmad, M.R. Z`aba
2015 Journal of Applied Sciences  
However, one of the main challenge in cloud computing is data security. Supposed each user has an access to the domain based on the privilege given by the server.  ...  The proposed model enables the organization to systematically identify vulnerability and threats and analyze the security risk when they use cloud computing services.  ...  Establish trust level: Trust level is based on varied and wide necessary trust criteria same as user's roles, offered services, assets, organization structure and technology issues in each virtual domain  ... 
doi:10.3923/jas.2015.953.967 fatcat:5m2g5geisnh3zephi2d5qcqawi

Trust in Pervasive Computing [chapter]

Jim Parker, Anand Patwardhan, Filip Perich, Anupam Joshi, Tim Finin
2006 The Handbook of Mobile Middleware  
Pervasive environments are comprised of resource-constrained mobile devices "limited" in their connectivity to other devices or networks due to the inherent dynamic nature of the environment.  ...  Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication.  ...  [16, 17] also describe a policy based infrastructure for security and trust management in multi-agent systems and the Semantic Web.  ... 
doi:10.1201/9781420013153.ch21 fatcat:poyrc5s5ynbezeziwn6z4h5pfy

T2AR: trust-aware ad-hoc routing protocol for MANET

Gayathri Dhananjayan, Janakiraman Subbiah
2016 SpringerPlus  
The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes.  ...  Besides, the direct and indirect trust observation schemes utilization increases the trust level.  ...  The large utilization level of social network extended the domain from the internet to mobile raised up pervasive social networking (PSN) which leads to the update in trust management protocols.  ... 
doi:10.1186/s40064-016-2667-6 pmid:27441127 pmcid:PMC4937011 fatcat:4cturmpodjh6ffifiidbdb63xm

A survey on pervasive computing over context-aware system

S. G. Gollagi, M. M. Math, A. A. Daptardar
2020 CCF Transactions on Pervasive Computing and Interaction  
Due to remarkable progress in various domains such as smart phones, computing power, sensor, network and embedded devices, wireless communications which are combined with social networking paradigms, cloud  ...  The extensive experiments are carried out on benchmark dataset to validate the efficiency of existing techniques namely multi-context, mechanisms of user-side publish/subscribe by using the metrics such  ...  This approach enhances various networking scenarios such as personal content distribution, health delivery in mobile, on-demand social networks, transportation systems, resource augmentation and smart  ... 
doi:10.1007/s42486-020-00030-6 fatcat:nmarqlkvyngdrhnbb3ln3winea

Comparative trust management with applications: Bayesian approaches emphasis

Krishnaprasad Thirunarayan, Pramod Anantharam, Cory Henson, Amit Sheth
2014 Future generations computer systems  
Trust relationships occur naturally in many diverse contexts such as collaborative systems, e-commerce, interpersonal interactions, social networks, and semantic sensor web.  ...  Ultimately, we need to develop expressive trust networks that can be assigned objective semantics.  ...  A BAYESIAN APPROACH TO MULTI- LEVEL TRUST Section 6 develops a Bayesian approach to multi-valued trust based on Dirichlet distribution.  ... 
doi:10.1016/j.future.2013.05.006 fatcat:bgrrhrvabzhxhgvyovbto5joom

Research on Transaction Security Mechanism of Mobile Commerce in Mobile Internet based on MAS

Jiang Wei-Jin, Xu Yu-Sheng, Guo Hong, Zhang Lian-Mei
2015 International Journal of Security and Its Applications  
Internet, by the research on problems in MI, such as trust, influencing factors to trust and trust mechanism, based on multi-Agent system coordination theory, a dynamic trust calculation model based on  ...  idea to transaction security in MI. mobility and social.  ...  Acknowledgements Supported by National Natural Science Foundation of China (61472136), Hunan Provincial Social Science Fund (07YBB239), Hunan Provincial Key Subject Construction project funding.  ... 
doi:10.14257/ijsia.2015.9.12.27 fatcat:zunstaxmnfhlfpf6ksv5ffah7u

TPS_DR: A Universal Dimension Reducing Algorithm for Optimal Trust Path Selection in Complex Sensor Network

Guangquan Xu, Xiuming Tian, Xiaochun Cao, Xiaohong Li, Zhiyong Feng
2013 Applied Mathematics & Information Sciences  
In this model, we represent the trust network based on high dimensional vector and matrix.  ...  Then, we propose an algorithm TPS DR (Trust Path Selection based on Dimensionality Reduction) to simplify the trust network through reducing the dimensionality, i.e. cluster some similar nodes into a supernode  ...  been supported by the National Natural Science Foundation of China (No. 61003080, 61070202) , the Opening Project of Shanghai Key Laboratory of Integrate Administration Technologies for Information Security  ... 
doi:10.12785/amis/071l23 fatcat:kbxttijkd5etrb7x2fdyojq7bu

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

Jung Tae Kim
2012 Journal of information and communication convergence engineering  
Security issues present an interesting research topic in wireless and pervasive healthcare networks.  ...  For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure.  ...  According to the structure of the security level, the measures can be categorized into three security layers: authentication based on the network, authentication based on the application, and database  ... 
doi:10.6109/jicce.2012.10.4.337 fatcat:drajrrvbjjhvxe2cpgkgopfd5u
« Previous Showing results 1 — 15 out of 8,849 results