140,077 Hits in 6.5 sec

Guest Editorial: Advances in Trust Management

Kangbin Yim
2010 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
This makes people get difficulties to give trust to the posts published on the social network services.  ...  service by overlaying itself on an existing social network service.  ...  Even though the Trust Management in these selected papers is somewhat limited to the social network services on the mobile environment, it ranges over whole the environment we are living.  ... 
doi:10.22667/jowua.2010.12.31.001 dblp:journals/jowua/Yim10 fatcat:gfbz4vajmbbmbn2cfop54l6voi

MACNET: Mobile Adhoc Collaborative NETworks

Jawwad Shamsi, S. Ali Raza, Hassan Farid, Taha Munir, Abbas Mehdi
2014 Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
MACNET (Mobile Ad-hoc Collaborative NETwork) implements a middleware to address the issues of collaboration, trust, and network connectivity.  ...  A large number of applications can utilize the MACNET framework for improved connectivity, rapid response, and better communication.  ...  Motivated by these two observations, this paper proposes MACNET (Mobile Ad-hoc Collaborative Network) -a framework for applications to exploit collaboration in mobile ad-hoc networks of smart phones.  ... 
doi:10.4108/icst.collaboratecom.2014.257322 dblp:conf/colcom/ShamsiRFMM14 fatcat:4gq67ds4zra7bj7344cif3poby

Privacy and Security in Mobile Cloud Computing: Review

Sapna Malik, M. M Chaturvedi
2013 International Journal of Computer Applications  
This review paper throws light on privacy and security issues of Mobile Cloud Computing.  ...  Mobile cloud computing is computing of Mobile application through cloud. As we know market of mobile phones is growing rapidly.  ...  The organization has full control on data, servers, networking, security and quality of services. Private clouds are for enterprise critical application and operations.  ... 
doi:10.5120/13906-1833 fatcat:brsqocxkgzb6rm5z4ynj54mmcm

Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

Shih-Hao Chang, Zhi-Rong Chen
2016 Mobile Information Systems  
Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely, Sybil attacks in MCS network.  ...  To cope with this problem, a cloud based trust management scheme (CbTMS) was proposed to detect Sybil attacks in the MCS network.  ...  Figure 1 represents the proposed framework; this framework contains three different layers: the cloud service provider layer, the trust management system layer, and the cloud service consumer layer.  ... 
doi:10.1155/2016/6506341 fatcat:tyi4hwkoufgeredtsayj5wh4g4

Secure Framework in Data Processing for Mobile Cloud Computing

2015 International journal of computer and communication technology  
In this paper, we present a new mobile cloud data processing framework through trust management and private data isolation.  ...  In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices as service nodes, e.g., sensing services.  ...  Selfmanaged identity and private keys can be used to form a self-managed and trusted ecosystem. This feature will be useful for managing trust based on social network applications. B.  ... 
doi:10.47893/ijcct.2015.1267 fatcat:hutl24jl3fdrpkjefx5vj2agji

PE-TLBS: Secure Location Based Services Environment with Emphasis on Direct Anonymous Attestation Protocol

Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan
2011 International Journal of Multimedia and Image Processing  
Thus, this paper presents Privacy Enhanced-Trusted Location Based Services (PE-TLBS) framework which create more trusted and privacy preserving services on top of existing Mobile Location Protocol (MLP  ...  Significantly, the proliferation of Location Based Services in mobile and wireless communication has also increased the need to address security, privacy and trust issues.  ...  Practically, LBSs is a mobile Client -Server based applications and services based on the location of mobile users that have emerged in services such as emergency services (e.g.  ... 
doi:10.20533/ijmip.2042.4647.2011.0006 fatcat:k2cu7xvyafgsnm3vqd2dqvmmki

Security Awareness in Software-Defined Multi-Domain 5G Networks

Jani Suomalainen, Kimmo Ahola, Mikko Majanen, Olli Mämmelä, Pekka Ruuska
2018 Future Internet  
the trustworthiness of a mobile network.  ...  The framework leverages software-defined networking and big data technologies to customize monitoring for different applications.  ...  NFV provides a virtualization framework where it is possible to create mobile network entities and services as Virtual Network Functions (VNFs) on demand and place them at the most suitable location using  ... 
doi:10.3390/fi10030027 fatcat:d5qeouyukvdj5g72y4miuuiope

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms [chapter]

Xinwen Zhang, Jean-Pierre Seifert, Onur Acıiçmez
2010 Lecture Notes in Computer Science  
Our design leverages the unique features of mobile devices, such as service convergence and limited permissions of user installed applications, and easily identifies the borderline between trusted and  ...  untrusted domains on mobile platform.  ...  Secondly, many trusted processes on a mobile device provides functions to both trusted and untrusted applications, mainly the framework services such as telephony server, message service, inter-process  ... 
doi:10.1007/978-3-642-17650-0_9 fatcat:xwg3vb6hv5eanj5gnr57e5w6c4

Mobile Government Applications Based on Security and Privacy: A Literature Review

Ala'a Saeb Al-Sherideh, Roesnita Ismail, Fauziah Abdul Wahid, Norasikin Fabil, Waidah Ismail
2018 International Journal of Engineering & Technology  
The users, who do not trust the security of mobile governmental applications, may reject the use of these applications which discourages the government to adopt the mobile services.  ...  The utilizing of mobile governmental applications is significant to reduce the efforts and time that are required to accomplish the public services by citizens.  ...  The trust of mobile applications for the governmental services in Jordan is one of the most central issues of mobile applications development.  ... 
doi:10.14419/ijet.v7i4.1.19492 fatcat:d6kx5ekmtbemxlysmeigekb224


2013 International Journal of Computer Science and Informatics  
In this paper, we present a new mobile cloud data processing framework through trust management and private data isolation.  ...  In addition to providing traditional computation services, mobile cloud also enhances the operation of traditional ad hoc network by treating mobile devices as service nodes, e.g., sensing services.  ...  Selfmanaged identity and private keys can be used to form a self-managed and trusted ecosystem. This feature will be useful for managing trust based on social network applications. B.  ... 
doi:10.47893/ijcsi.2013.1127 fatcat:by3dszgofzcfdomerutqhvfppi

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

G. Jagadamba, B. Sathish Babu
2017 Indian Journal of Science and Technology  
Application/ Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.  ...  The study finds context and trust as essential to develop adaptive and accurate security framework.  ...  A trust-based service management for each node participating as the service provider or a service requester in service-oriented MANETs (Mobile AdHoc Networks) was proposed 54 for effective trust management  ... 
doi:10.17485/ijst/2016/v9i48/89396 fatcat:xf5kghfkqnh3dg5lfdgzmxrqsq

Falcon: A Blockchain-Based Edge Service Migration Framework in MEC

Xiangjun Zhang, Weiguo Wu, Shiyuan Yang, Xiong Wang, Prosanta Gope
2020 Mobile Information Systems  
Application services on the edge side should be migrated from different edge servers to edge nodes closer to users, so that services follow users and ensure high-quality services.  ...  To tackle this challenge, this paper innovatively proposes a blockchain-based security edge service migration framework, Falcon, which uses mobile agents different from VM and container as edge service  ...  End users are Linux mobile devices running mobile applications on Android, iOS, Windows, or other platforms.  ... 
doi:10.1155/2020/8820507 fatcat:y2ww3zo3yrhsnhi2rgsb5jimdi

Building Adaptable Mobile Middleware Services Using Logical Mobility Techniques [chapter]

Stefanos Zachariadis, Manish Lad, Cecilia Mascolo, Wolfgang Emmerich
2007 Studies in Computational Intelligence  
In recent years, various mobile middleware systems have been developed that build on top of the protocol stack provided by the underlying network operating system, to offer a set of higher level services  ...  We present logical mobility as a technique for dynamic adaptation, detail a specification of a framework that offers its flexible use, and present a number of dynamic middleware services, which can be  ...  Networked middleware systems build on the protocol stack to offer higher level services to applications. These services range from remote procedure calls to data sharing and service discovery.  ... 
doi:10.1007/978-3-540-44910-2_1 fatcat:nzzh2qbwkzexhau3o3wpif44wq

Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation [chapter]

Yexia Cheng, Yuejin Du, Jin Peng, Jun Fu, Baoxu Liu
2019 Communications in Computer and Information Science  
The framework can be used to construct an open, trusted, resilient network for secure accessing and provide security solutions for mobile office, IoT security, information security management and control  ...  The effectiveness of the framework has been proved by its application to the market.  ...  This work is also supported by Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology.  ... 
doi:10.1007/978-981-13-6621-5_14 fatcat:xakuiyus2rcovcrgiv4p7y6zpe

Trust delegation for medical records access using public mobile networks

Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic
2009 Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare  
This paper provides detailed solutions for trust delegation and secure temporary storage of medical records for authorized users in public mobile communication networks.  ...  While this paradigm is a natural goal for both service providers and users in commercial applications, for the exchange of sensitive personal medical information authentication and security present major  ...  Crucially, the process of trust negotiation needs to be simple and compatible with the operation of the mobile network and the mobile service application on the mobile devices in use at the requestor HSP  ... 
doi:10.4108/icst.pervasivehealth2009.6057 dblp:conf/ph/WeerasingheRR09 fatcat:owmgtt6mnrbkxcxwtcpoia3u3m
« Previous Showing results 1 — 15 out of 140,077 results