Decentralized trust management: Risk analysis and trust aggregation
X Fan, L Liu, R Zhang, Q Jing, J Bi - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
Decentralized trust management is used as a referral benchmark for assisting decision
making by human or intelligence machines in open collaborative systems. During any given …
making by human or intelligence machines in open collaborative systems. During any given …
A two-way trust management system for fog computing
Fog computing is the next frontier of cloud computing since it can compute and store a
massive amount of data generated by IoT devices near their sources. Indeed, transmitting all …
massive amount of data generated by IoT devices near their sources. Indeed, transmitting all …
Trust management as a service: Enabling trusted execution in the face of byzantine stakeholders
Trust is arguably the most important challenge for critical services both deployed as well as
accessed remotely over the network. These systems are exposed to a wide diversity of …
accessed remotely over the network. These systems are exposed to a wide diversity of …
Trust management of services (TMoS): investigating the current mechanisms
V Hayyolalam, B Pourghebleh… - Transactions on …, 2020 - Wiley Online Library
Generally, service interactions in dynamic environments comprising cloud computing,
Internet of Things (IoT), and etc. occur in an unspecified situation causing trust management …
Internet of Things (IoT), and etc. occur in an unspecified situation causing trust management …
Multi-dimensional dynamic trust evaluation scheme for cloud environment
PS Challagidad, MN Birje - Computers & Security, 2020 - Elsevier
In cloud computing environment, Cloud Customers (CCs) and Cloud Service Providers
(CSPs) require to evaluate the trust levels of potential partner prior to appealing in …
(CSPs) require to evaluate the trust levels of potential partner prior to appealing in …
A zero-trust federated identity and access management framework for cloud and cloud-based computing environments
Abstract Identity and Access Management (IAM) is an important aspect of information
security. The deployment of cloud computing (CC) and cloud-based computing (CbC) …
security. The deployment of cloud computing (CC) and cloud-based computing (CbC) …
Key factors increasing trust in cloud computing applications in the kingdom of bahrain
H Ali - International Journal of Computing and Digital Systems, 2020 - journals.uob.edu.bh
During recent years, cloud-computing applications have been increasing. However, with this
increase there are many concerns that affect the adoption of these applications. One of …
increase there are many concerns that affect the adoption of these applications. One of …
A cloud trusting mechanism based on resource ranking
AK Daniel - Handling Priority Inversion in Time-Constrained …, 2020 - igi-global.com
The cloud-based computing paradigm helps organizations grow exponentially through
means of employing an efficient resource management under the budgetary constraints. As …
means of employing an efficient resource management under the budgetary constraints. As …
A consumer-centric conceptual framework for trust assessment in cloud computing
Consumers are heavily dependent on secure and reliable cloud computing services.
However, there are various shortcomings in cloud services, such as those concerning …
However, there are various shortcomings in cloud services, such as those concerning …
ED-BeCT: An enhanced dynamic behavioral cloud trust model to evaluate the trustworthiness of the cloud service provider
S Moazzezi Eftekhar - 2020 - espace.etsmtl.ca
Cloud computing is an evolving technology providing the delivery of on-demand calculating
services to offer scalable resources dynamically in an economical manner. The companies …
services to offer scalable resources dynamically in an economical manner. The companies …