Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trust model
biblio
Research of trust model based on fuzzy theory in mobile ad hoc networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:55am
mobile ad hoc network security
trust-based multicast routing protocol
trust model
telecommunication security
Routing protocols
network trust dynamic adaptability
network interaction quality
multiple trust decision factor
multicast protocols
multi-agent systems
multi-agent system
mobile ad hoc networks
analytic hierarchy process
malicious node detection
information-theoretic framework
fuzzy theory
fuzzy set theory
Fuzzy logic
fuzzy analytic hierarchy process theory
FAPtrust
entropy weight method
decision-making
Decision Making
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
MTBAC: A mutual trust based access control model in Cloud computing
Submitted by BrandonB on Fri, 05/01/2015 - 8:36am
mutual trust mechanism
web services
virtualized Web services
virtualisation
user behavior trust
trust model
Trust management
Time-frequency Analysis
scalable Web services
Reliability
open conditions
mutual trust relationship
Access Control
mutual trust based access control model
MTBAC model
MTBAC
Data Security
Computational modeling
cloud service node credibility
cloud computing security
cloud computing environment
Cloud Computing
authorisation
biblio
Computing Trust as a Form of Presumptive Reasoning
Submitted by BrandonB on Thu, 04/30/2015 - 1:31pm
presumptive reasoning
Walton argumentation schemes
Trusted Computing
trust schemes
trust model
trust expertise
trust computing
trust
standards
cognition
online communities
Measurement
fuzzy logics
Fuzzy logic
Context
Computational modeling
Communities
biblio
Evidence-based Trust Reasoning
Submitted by jingweihuang on Wed, 09/17/2014 - 6:31pm
Modeling
Science of Security
Foundations
ACM CCS
Evidence-based trust
foundations
modeling
Operating systems security
privacy
Science of Security
Systems Security
Trust Frameworks
trust model
Trusted Computing
Trusted platforms
ACM CCS
Trusted Computing
Trusted platforms
Trust Frameworks
Operating Systems Security
Systems Security
« first
‹ previous
1
2
3
4