Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trust management
biblio
Secure and Scalable Trust Management Model for IoT P2P Network
Submitted by aekwall on Mon, 04/06/2020 - 9:14am
security issues
peer to peer security
P2P network
large-scale trust model
IoT trust management
IoT resources
IoT P2P network
IoT entities
Holochain
fog node approach
distributed trust management model
DHT
centralized models
blockchain-based trust management model
Trust management
security of data
Human Factors
Scalability
IoT security
Reliability
blockchain
Metrics
Peer-to-peer computing
component
pubcrawl
Resiliency
Data models
Trusted Computing
data integrity
Internet of Things
biblio
ANFIS based Trust Management Model to Enhance Location Privacy in Underwater Wireless Sensor Networks
Submitted by aekwall on Mon, 03/02/2020 - 11:36am
MDP
adaptive neuro fuzzy inference system
ANFIS
complex security
FIS learning rules
forwarding node
malicious node
marine communication
MATLAB
UWSN
resource constraint behaviour
sensor node
trust behaviour
trust management model
trusted node
Underwater Wireless Sensor Networks
Underwater Networks
Routing
Scalability
data privacy
telecommunication security
Resiliency
pubcrawl
wireless sensor networks
location privacy
privacy
Intrusion Detection
Metrics
authentication
Data mining
information and communication technology
Markov Decision Process
Markov processes
Trust management
biblio
Towards the Trust-Enhancements of Single Sign-On Services
Submitted by grigby1 on Tue, 01/21/2020 - 10:32am
certificate
collaboration
composability
Human behavior
Information Assurance
Metrics
policy-based governance
pubcrawl
public key infrastructure
resilience
Resiliency
Scalability
single sign-on
Trust management
trusted third party
biblio
On Blockchain Architectures for Trust-Based Collaborative Intrusion Detection
Submitted by grigby1 on Tue, 01/21/2020 - 10:23am
Intrusion Detection Systems
blockchain
blockchain architectures
CIDN peers
collaboration
collaborative IDS nodes
collaborative intrusion detection
collaborative intrusion detection networks
Cryptography
Distributed databases
distributed ledger technologies
Human behavior
insider attacks
insider threat
Insider Threats
Intrusion Detection
Trusted Computing
IP networks
Metrics
Monitoring
Peer-to-peer computing
policy-based governance
pubcrawl
resilience
Resiliency
security
tampered-resistant trust-chain
Trust management
trust management issues
trust-based blockchain
trust-based collaborative intrusion detection
biblio
Context-Aware Trust Management System for IoT Applications with Multiple Domains
Submitted by aekwall on Mon, 01/13/2020 - 11:06am
reputation systems
context-aware trust management system
context-aware trust model
context-aware trust models
context-based trust evaluation
distributed resource-constrained IoT devices
heterogeneous devices
lightweight IoT devices
reputation system
Context-Aware Trust Evaluation
service provider
smart wildlife
Traffic Management
Trust Management System
trust values
trustworthiness record
Wildlife
IoT
Context modeling
context items
context information
Base stations
Trust management
ubiquitous computing
6LoWPAN
composability
pubcrawl
Resiliency
Trusted Computing
performance evaluation
IoT applications
Internet of Things
computer network security
biblio
Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust
Submitted by aekwall on Mon, 12/09/2019 - 11:23am
psychology
Computing Theory and Trust
trust modeling
systems engineering processes
Systems architecture
System Engineering
requirements analysis
graph-based modeling methodology
graph-based algorithm
engineering trust
disparate system
Component architectures
complex multitiered system architectures
complex intersystem trust relationships
Compositionality
cognition
security of data
modeling
Risk
evaluation
Trust management
Measurement
trust
systems engineering
Vulnerability
Metrics
Computational modeling
graph theory
composability
pubcrawl
Trusted Computing
biblio
A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
Submitted by aekwall on Mon, 12/09/2019 - 11:23am
service request
preference learning
Processor scheduling
QoS provision
quality of service provision
scheduling
serious security risks
service brokers
service composition
multiagent platform JADE
three-layered trust-enabled service composition model
transaction success rate
trust-based agent learning model
user experience
user experiences
user preference learning
user satisfaction
Computing Theory and Trust
Trust management
Task Analysis
Trusted Computing
mobile computing
learning (artificial intelligence)
pubcrawl
composability
Computational modeling
multi-agent systems
Cloud Computing
fuzzy set theory
quality of service
mobile cloud computing
Compositionality
customers service preferences
fuzzy comprehensive evaluation method
mobile cloud computing environments
multi-agent technology
biblio
TRUFL: Distributed Trust Management Framework in SDN
Submitted by aekwall on Mon, 11/18/2019 - 10:49am
cloud environment
PKI Trust Models
trust management schemes
Trust management
TRUFL framework scales
transfer rates
public key infrastructure
distributed trust mechanism
distributed trust management framework
digital signatures
data plane-control plane elements
Control Plane-Application Plane
control plane elements
cloud infrastructure
centralized trust management
trust establishment
computer network security
public key cryptography
Public key
SDN
Metrics
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
Trusted Computing
Protocols
authorization
Scalability
Cloud Computing
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 10:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
A Comparative Analysis of Trust Models for Safety Applications in IoT-Enabled Vehicular Networks
Submitted by grigby1 on Mon, 08/05/2019 - 10:35am
reliable trusted information dissemination
end-to-end delays
entity-oriented trust models
event detection probabilities
false information dissemination
false positive rates
hybrid trust models
Intelligent Transportation Systems
IoT-enabled vehicular networks
network entities
quality-of-service related benchmarks
received information
data oriented trust models
safety applications
secure environment
secure trusted network
smart cities
steep-curve warnings
surrounding infrastructure
transportation technology
Trust management
Trust models
vehicular nodes
false trust
probability
Safety
Computational modeling
resilience
pubcrawl
Resiliency
Scalability
Data models
information dissemination
computer network security
network nodes
Internet-of-Things
Internet of Things
VANET
vehicular ad hoc networks
sensitive information
Comparative Analysis
policy-based governance
collaboration
Vehicular Ad-hoc Network
authentic trusted information dissemination
black ice
comfortable driving experience
compromised information dissemination
« first
‹ previous
1
2
3
4
5
6
next ›
last »