To see the other types of publications on this topic, follow the link: Node-based Trust Management Framework.

Journal articles on the topic 'Node-based Trust Management Framework'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Node-based Trust Management Framework.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kaur, Jugminder, Sandeep S. Gill, and Balwinder S. Dhaliwal. "Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks." Journal of Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2089714.

Full text
Abstract:
Security is always a major concern in wireless sensor networks (WSNs). Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF) routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This
APA, Harvard, Vancouver, ISO, and other styles
2

Kaur, J., and S. Kaur. "A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network." International Journal of Business Data Communications and Networking 15, no. 2 (2019): 35–54. http://dx.doi.org/10.4018/ijbdcn.2019070103.

Full text
Abstract:
Mobile Ad Hoc Networks (MANETs) are comprised of an arrangement of self-sorting mobile hosts furnished with wireless interaction devices gathered in groups without the need of any settled framework as well as centralized organization to maintain a system over radio connections. Every mobile node can react as a host and also, the router freely utilizes the wireless medium inside the correspondence range to deal with the interaction between huge quantities of individual mobile nodes by framing a correspondence system and trading the information among them without using any described group of the
APA, Harvard, Vancouver, ISO, and other styles
3

Soleymani, Mona, Navid Abapour, Elham Taghizadeh, Safieh Siadat, and Rasoul Karkehabadi. "Fuzzy Rule-Based Trust Management Model for the Security of Cloud Computing." Mathematical Problems in Engineering 2021 (June 15, 2021): 1–14. http://dx.doi.org/10.1155/2021/6629449.

Full text
Abstract:
In the last few years, due to the benefit of solving large-scale computational problems, researchers have been developed multicloud infrastructures. The trust-related issue in multiclouds includes more complicated content and new problems. A new trust management framework for multicloud environments is proposed in this article. The proposed framework used a combination of objective and subjective trust values to calculate the cloud service provider’s trust values. This new framework can identify and rectify fake feedbacks from other feedbacks. Another advantage of this framework is applying fu
APA, Harvard, Vancouver, ISO, and other styles
4

Chakravartula, Raghu Nallani, and Naga Lakshmi V. "Trust Management Framework for IOT Based P2P Objects." International Journal of Peer to Peer Networks 8, no. 2/3 (2017): 17–24. http://dx.doi.org/10.5121/ijp2p.2017.8302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abedinzadeh, Sadra, and Samira Sadaoui. "A Rough Sets-based Agent Trust Management Framework." International Journal of Intelligent Systems and Applications 5, no. 4 (2013): 1–19. http://dx.doi.org/10.5815/ijisa.2013.04.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Akinboro, S. A., E. A. Olajubu, I. K. Ogundoyin, and G. A. Aderounmu. "A Prototype for Global Trust Management in Mobile Ambient Home Network." International Journal of Advanced Pervasive and Ubiquitous Computing 6, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/ijapuc.2014070104.

Full text
Abstract:
This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to shield home devices from attacks. While real time dynamic source routing protocol was employed to prevent the channel from attacks by selfish and malicious nodes. The prototype of the framework was imple
APA, Harvard, Vancouver, ISO, and other styles
7

Raza, Zahid, and Akhilesh Kumar Singh. "A Framework for the Blockchain and IoT-Based Supply Chain Management System." International Journal of Applied Logistics 12, no. 1 (2022): 1–30. http://dx.doi.org/10.4018/ijal.309090.

Full text
Abstract:
Supply chain management (SCM) applications are being developed using blockchain technologies (BCT). This work proposes a blockchain and IoT-based supply chain system (BITS) framework to help create permanent records using smart contracts that can be shared and acted across a product supply chain in the SCM in a decentralized fashion. BITS ensures improved trust, security, transparency, and traceability among the participants aided with BCT and IoT. A demonstration of the data flow and the conceptual illustration of BITS is presented. Algorithms for node authorization and verification based on
APA, Harvard, Vancouver, ISO, and other styles
8

Pal, Shantanu, Ambrose Hill, Tahiry Rabehaja, and Michael Hitchens. "A blockchain-based trust management framework with verifiable interactions." Computer Networks 200 (December 2021): 108506. http://dx.doi.org/10.1016/j.comnet.2021.108506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

El-Sayed, Hesham, Henry Alexander Ignatious, Parag Kulkarni, and Salah Bouktif. "Machine learning based trust management framework for vehicular networks." Vehicular Communications 25 (October 2020): 100256. http://dx.doi.org/10.1016/j.vehcom.2020.100256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Qiuwei, Sunyong Wu, Fan Hong, and Junguo Liao. "Authorization management framework based on joint trust-risk evaluation." Wuhan University Journal of Natural Sciences 12, no. 1 (2007): 9–12. http://dx.doi.org/10.1007/s11859-006-0129-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mada, Badr Eddine, Miloud Bagaa, and Tarik Taleb. "Trust-Based Video Management Framework for Social Multimedia Networks." IEEE Transactions on Multimedia 21, no. 3 (2019): 603–16. http://dx.doi.org/10.1109/tmm.2019.2893548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gupta, Punit, and Deepika Agrawal. "Trusted Cloud Platform for Cloud Infrastructure." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 8 (2013): 1884–91. http://dx.doi.org/10.24297/ijct.v10i8.1473.

Full text
Abstract:
Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not qualify cloud computing environment requirements. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values, trust bas
APA, Harvard, Vancouver, ISO, and other styles
13

Mohanaprakash, K., and T. GunaSekar. "Efficient and Secure Remote Health Management in Cloud in Vehicular Adhoc Network Environment." Journal of Medical Imaging and Health Informatics 11, no. 12 (2021): 2966–75. http://dx.doi.org/10.1166/jmihi.2021.3905.

Full text
Abstract:
Vehicle Ad Hoc Networks (VANETs) is a crucial communications framework for transferring messages between any healthcare systems. The dilemma of fixing the safest efficient route is a tedious issue in VANET. Hence the secure and most reliable way will give the appropriate solution for the routing issues in the VANET. In this paper, by using the Multi-Objective Bio-inspired Heuristic Cuckoo Search Node optimization algorithm is designed to find the efficient safest route for transferring health data within a short period. After seeing the efficient route, the node can be distinguished upon the t
APA, Harvard, Vancouver, ISO, and other styles
14

Gazdar, Tahani, Ohoud Alboqomi, and Asmaa Munshi. "A Decentralized Blockchain-Based Trust Management Framework for Vehicular Ad Hoc Networks." Smart Cities 5, no. 1 (2022): 348–63. http://dx.doi.org/10.3390/smartcities5010020.

Full text
Abstract:
Vehicular Ad hoc Networks (VANETs) are one of the pillars of the Internet of Vehicles, they provide plenty of applications ranging from safety to entertainment. Safety applications largely depend on reliable and authentic traffic-related data. However, ensuring the data reliability and authenticity is facing many challenges due mainly to the scalability of VANETs such as the high speed, the long roads, and the open nature of VANETs. This paper addresses these challenges by proposing a decentralized Blockchain-based trust management framework (BC-TMF) aiming to compute trust metrics for vehicle
APA, Harvard, Vancouver, ISO, and other styles
15

M., Anugraha, and Dr Krishnaveni S.H. "SRTE: Security Resource Allocation for Trust Model in Evaluate the Strong Node." Webology 19, no. 1 (2022): 1387–97. http://dx.doi.org/10.14704/web/v19i1/web19092.

Full text
Abstract:
Mobile ad hoc network (MANET) is a framework-free as well as self-designing network in which Mobile Nodes (MN) travel freely across the contact spectrum using cellular network interfaces. Through the advancement of wireless technologies, a complex network can better handle data communication protection while improving quality of service (QoS) metrics. MANET is defenceless to security breaches due to the absence of a trusted unified authority. In MANET, the SRTE approach, also known as protection allocation of resources for trust model, is introduced for evaluating strong nodes. Main contributi
APA, Harvard, Vancouver, ISO, and other styles
16

Namal, Suneth, Hasindu Gamaarachchi, Gyu Myoung Lee, and Tai-Won Um. "Autonomic Trust Management in Cloud-Based and Highly Dynamic IOT Applications." JOURNAL OF INTERNATIONAL BUSINESS RESEARCH AND MARKETING 1, no. 5 (2016): 26–32. http://dx.doi.org/10.18775/jibrm.1849-8558.2015.15.3004.

Full text
Abstract:
In this paper, we propose an autonomic trust management framework for cloud based and highly dynamic Internet of Things (IoT) applications and services. IoT is creating a world where physical objects are seamlessly integrated in order to provide advanced and intelligent services for humanbeings in their day-to-day life style. Therefore, trust on IoT devices plays an important role in IoT based services and applications. Cloud computing has been changing the way how provides are looking into these issues. Many studies have proposed different techniques to address trust management although non o
APA, Harvard, Vancouver, ISO, and other styles
17

Gupta, Radhika, Dr Sahil Verma, Dr Kavita, and Anup Ial Yadav. "A Comparative Analysis of Trust Based Applications in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.12 (2018): 73. http://dx.doi.org/10.14419/ijet.v7i4.12.20996.

Full text
Abstract:
The wireless sensor network is a type of ad hoc network which is vulnerable to security attacks, specifically insider attacks. In spite of the fact that confidentiality, integrity and authentication helps in forestalling the particular sort of attacks, but they come at an expense. A traditional and evergreen concept of the trust evaluation and management, among the nodes of a network, for communication is a good and effective security measure. Overseeing trust in a distributed wireless sensor network is a challenging task when coordinated effort or participation is must in accomplishing missio
APA, Harvard, Vancouver, ISO, and other styles
18

Gundluru, Nagaraja, and Pradeep Ch. "Soft-Computing Based Trust Management Framework for Group Key Management in MANETs." International Journal of Intelligent Engineering and Systems 10, no. 3 (2017): 327–36. http://dx.doi.org/10.22266/ijies2017.0630.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Ruan, Yefeng, Ping Zhang, Lina Alfantoukh, and Arjan Durresi. "Measurement Theory-Based Trust Management Framework for Online Social Communities." ACM Transactions on Internet Technology 17, no. 2 (2017): 1–24. http://dx.doi.org/10.1145/3015771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Xiao, and Liangmin Wang. "A Cloud-Based Trust Management Framework for Vehicular Social Networks." IEEE Access 5 (2017): 2967–80. http://dx.doi.org/10.1109/access.2017.2670024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ahamed, Sheikh I., Mohammad Zulkernine, and Steve Wolfe. "A software-based trust framework for distributed industrial management systems." Journal of Systems and Software 80, no. 10 (2007): 1621–30. http://dx.doi.org/10.1016/j.jss.2007.01.043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Xin Xin, Shao Hua Tang, and Kai Wei. "OntoRT: An Ontology Model for Role-Based Trust-Management Framework." Applied Mechanics and Materials 58-60 (June 2011): 2085–90. http://dx.doi.org/10.4028/www.scientific.net/amm.58-60.2085.

Full text
Abstract:
This paper presents OntoRT, an ontology model for Role-base Trust-management(RT) framework, which covers a large fragment of RT including RT0, RT1, RT2 and application domain specification documents (ADSDs). RT addresses distributed authorization problems in decentralized collaborative systems. OntoRT establishes a common vocabulary for RT roles and policies across domains. We describe OntoRT formally in Description Logic(DL) SHOIN(D) and DL-safe SWRL rules. Basing on our logical formalization it is feasible to authorize and analyze RT policies automatically via the state of arts DL reasoners.
APA, Harvard, Vancouver, ISO, and other styles
23

Hassan, Mohammad Waseem, Richard McClatchey, and Ian Willers. "A Scalable Evidence Based Self-Managing Framework for Trust Management." Electronic Notes in Theoretical Computer Science 179 (July 2007): 59–73. http://dx.doi.org/10.1016/j.entcs.2006.08.031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Rana, Kajol, Ajay Vikram Singh, and P. Vijaya. "Intelligent Trust based Security Framework for Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 2s (2022): 14–22. http://dx.doi.org/10.17762/ijritcc.v10i2s.5907.

Full text
Abstract:
Trust models have recently been proposed for Internet of Things (IoT) applications as a significant system of protection against external threats. This approach to IoT risk management is viable, trustworthy, and secure. At present, the trust security mechanism for immersion applications has not been specified for IoT systems. Several unfamiliar participants or machines share their resources through distributed systems to carry out a job or provide a service. One can have access to tools, network routes, connections, power processing, and storage space. This puts users of the IoT at much greate
APA, Harvard, Vancouver, ISO, and other styles
25

Ahmad, Rami, Raniyah Wazirali, Tarik Abu-Ain, and Tarik Adnan Almohamad. "Adaptive Trust-Based Framework for Securing and Reducing Cost in Low-Cost 6LoWPAN Wireless Sensor Networks." Applied Sciences 12, no. 17 (2022): 8605. http://dx.doi.org/10.3390/app12178605.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are the core of the Internet of Things (IoT) technology, as they will be used in various applications in the near future. The issue of security and power consumption is still one of the most important challenges facing this type of network. 6LoWPAN protocol was developed to meet these challenges in networks with limited power and resources. The 6LoWPAN uses a hierarchical topology and the traditional method of encryption and key management, keeping power consumption levels high. Therefore, in this paper, a technique has been developed that helps in balancing sec
APA, Harvard, Vancouver, ISO, and other styles
26

Fan, Wenjuan, and Harry Perros. "A novel trust management framework for multi-cloud environments based on trust service providers." Knowledge-Based Systems 70 (November 2014): 392–406. http://dx.doi.org/10.1016/j.knosys.2014.07.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

P, Varalakshmi, and Judgi T. "Multifaceted trust management framework based on a trust level agreement in a collaborative cloud." Computers & Electrical Engineering 59 (April 2017): 110–25. http://dx.doi.org/10.1016/j.compeleceng.2016.10.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Lwin, May Thura, Jinhyuk Yim, and Young-Bae Ko. "Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks." Sensors 20, no. 3 (2020): 698. http://dx.doi.org/10.3390/s20030698.

Full text
Abstract:
As a trending and interesting research topic, in recent years, researchers have been adopting the blockchain in the wireless ad-hoc environment. Owing to its strong characteristics, such as consensus, immutability, finality, and provenance, the blockchain is utilized not only as a secure data storage for critical data but also as a platform that facilitates the trustless exchange of data between independent parties. However, the main challenge of blockchain application in an ad-hoc network is which kind of nodes should be involved in the validation process and how to adopt the heavy computatio
APA, Harvard, Vancouver, ISO, and other styles
29

Yao, Zhiying, Daeyoung Kim, and Yoonmee Doh. "PLUS: parameterised localised trust management-based security framework for sensor networks." International Journal of Sensor Networks 3, no. 4 (2008): 224. http://dx.doi.org/10.1504/ijsnet.2008.019005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Sidhu, Jagpreet, and Sarbjeet Singh. "A novel cloud auditor based trust management framework for cloud computing." International Journal of Grid and Utility Computing 7, no. 3 (2016): 219. http://dx.doi.org/10.1504/ijguc.2016.080197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Singh, Sarbjeet, and Jagpreet Sidhu. "A novel cloud auditor based trust management framework for cloud computing." International Journal of Grid and Utility Computing 7, no. 3 (2016): 219. http://dx.doi.org/10.1504/ijguc.2016.10000995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Rahmani, Mohammad Khalid Imam, Mohammed Shuaib, Shadab Alam, et al. "Blockchain-Based Trust Management Framework for Cloud Computing-Based Internet of Medical Things (IoMT): A Systematic Review." Computational Intelligence and Neuroscience 2022 (May 19, 2022): 1–14. http://dx.doi.org/10.1155/2022/9766844.

Full text
Abstract:
The internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. These medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack computational power, the collected data can be processed and analyzed in the cloud by more computationally intensive tools. Cloud computing in IoMT is also used to store IoT data as part of a collaborative effort. Cloud computing has provided new avenues for providing services to users with better user experience, scalability, and proper resource utilizatio
APA, Harvard, Vancouver, ISO, and other styles
33

Sharma, Sanjeev Kumar, and Ugrasen Suman. "A trust-based architectural framework for collaborative filtering recommender system." International Journal of Business Information Systems 16, no. 2 (2014): 134. http://dx.doi.org/10.1504/ijbis.2014.062835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tian, Chunqi, and Baijian Yang. "Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks." Future Generation Computer Systems 27, no. 8 (2011): 1135–41. http://dx.doi.org/10.1016/j.future.2011.03.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Lorraine S., and William D. Brink. "Trust in Cloud-Based Services: A Framework for Consumer Adoption of Software as a Service." Journal of Information Systems 34, no. 2 (2019): 65–85. http://dx.doi.org/10.2308/isys-52626.

Full text
Abstract:
ABSTRACT Guidelines originating from practice suggest the Trust Services Criteria of security, availability, processing integrity, confidentiality, and privacy should be key factors affecting the trust of cloud-based systems. In our study, we test a model of end-user adoption of cloud-based software as a service (SaaS) by integrating the five principles from the Trust Services Criteria with systems risk. Using a survey methodology to collect data and analyzing it with structural equation modeling, we test hypotheses associated with the model. Our results show statistical support for the factor
APA, Harvard, Vancouver, ISO, and other styles
36

Rehman, Abdul, Mohd Fadzil Hassan, Yew Kwang Hooi, et al. "Context and Machine Learning Based Trust Management Framework for Internet of Vehicles." Computers, Materials & Continua 68, no. 3 (2021): 4125–42. http://dx.doi.org/10.32604/cmc.2021.017620.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Premarathne, Uthpala Subodhani, Ibrahim Khalil, Zahir Tari, and Albert Zomaya. "Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management." IEEE Transactions on Cloud Computing 5, no. 2 (2017): 290–302. http://dx.doi.org/10.1109/tcc.2015.2404816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Belkadi, Farouk, Mourad Messaadia, Alain Bernard, and David Baudry. "Collaboration management framework for OEM – suppliers relationships: a trust-based conceptual approach." Enterprise Information Systems 11, no. 7 (2016): 1018–42. http://dx.doi.org/10.1080/17517575.2016.1250166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Xi Yuan, and Miao Liang Zhu. "A Semantic and Trust Based Framework for RBAC User-Role Assignment." Key Engineering Materials 439-440 (June 2010): 178–82. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.178.

Full text
Abstract:
Semantic; Trust Management; RBAC; User-role Assignment Abstract. The application of RBAC in access management of the enterprise services and resources is very widely. With phenomenal growth of information interaction and cooperation between distributed systems, the number of users can be in the hundreds of thousands or millions. This renders manual user-to-role assignment a formidable task. In this paper, we propose a semantic and trust based framework to automatically assign users to roles based on a finite set of assignment rules defined by authorized people in the enterprise. These rules ta
APA, Harvard, Vancouver, ISO, and other styles
40

Ma, Yao, Hong Wei Lu, and Yi Zhu Zhao. "Building a Risk-Aware Adaptive Trust Negotiation Framework." Advanced Materials Research 171-172 (December 2010): 7–10. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.7.

Full text
Abstract:
In the uncertain environment, trust and risk are both key elements for making trust-based decisions. Risk is regarded as a supplement to trust or even omitted in the most existing trust models, which will lead to one-sided or subjective decisions. To solve the issues, a risk-aware adaptive trust negotiation framework is proposed in this paper. According to the specific negotiation context, the framework analyzes the potential risks and adapts dynamic access control levels appropriately with risk management methods. The use case results indicate that this framework can identify the potential ri
APA, Harvard, Vancouver, ISO, and other styles
41

Velmovitsky, Pedro Elkind, Pedro Augusto Da Silva E. Souza Miranda, Hélène Vaillancourt, Tania Donovska, Jennifer Teague, and Plinio Pelegrini Morita. "A Blockchain-Based Consent Platform for Active Assisted Living: Modeling Study and Conceptual Framework." Journal of Medical Internet Research 22, no. 12 (2020): e20832. http://dx.doi.org/10.2196/20832.

Full text
Abstract:
Background Recent advancements in active assisted living (AAL) technologies allow older adults to age well in place. However, sensing technologies increase the complexity of data collection points, making it difficult for users to consent to data collection. One possible solution for improving transparency in the consent management process is the use of blockchain, an immutable and timestamped ledger. Objective This study aims to provide a conceptual framework based on technology aimed at mitigating trust issues in the consent management process. Methods The consent management process was mode
APA, Harvard, Vancouver, ISO, and other styles
42

Asif, Muhammad, Zeeshan Aziz, Maaz Bin Ahmad, Adnan Khalid, Hammad Abdul Waris, and Asfandyar Gilani. "Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities." Sensors 22, no. 7 (2022): 2604. http://dx.doi.org/10.3390/s22072604.

Full text
Abstract:
Security has always been the main concern for the internet of things (IoT)-based systems. Blockchain, with its decentralized and distributed design, prevents the risks of the existing centralized methodologies. Conventional security and privacy architectures are inapplicable in the spectrum of IoT due to its resource constraints. To overcome this problem, this paper presents a Blockchain-based security mechanism that enables secure authorized access to smart city resources. The presented mechanism comprises the ACE (Authentication and Authorization for Constrained Environments) framework-based
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Jing Pei, Sun Bin, Yang Yu, and Xin Xin Niu. "Distributed Trust Management Mechanism for the Internet of Things." Applied Mechanics and Materials 347-350 (August 2013): 2463–67. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.2463.

Full text
Abstract:
Trust management provides a potential solution for the security issues of distributed networks. However, there are rare researches about the trust mechanism for IoT in the literature. A new distributed trust management mechanism for IoT is established in this paper. Firstly, we extract three basic elements-service, decision-making and self-organizing, of trust management from the investigated trust solutions. Then, based on a service model, we establish a trust management frame-work for the layered IoT, which is decomposed into three layers: sensor layer, core layer and application layer. Fina
APA, Harvard, Vancouver, ISO, and other styles
44

C. Köbis, Nils, Ivan Soraperra, and Shaul Shalvi. "The Consequences of Participating in the Sharing Economy: A Transparency-Based Sharing Framework." Journal of Management 47, no. 1 (2020): 317–43. http://dx.doi.org/10.1177/0149206320967740.

Full text
Abstract:
The sharing economy is estimated to add hundreds of billions of dollars to the global economy and is rapidly growing. However, trust-based commercial sharing—the participation in for-profit peer-to-peer sharing-economy activity—has negative as well as positive consequences for both the interacting parties and uninvolved third parties. To share responsibly, one needs to be aware of the various consequences of sharing. We provide a comprehensive, preregistered, systematic literature review of the consequences of trust-based commercial sharing, identifying 93 empirical papers spanning regions, se
APA, Harvard, Vancouver, ISO, and other styles
45

Ahmed, Malik N., Abdul Hanan Abdullah, Hassan Chizari, and Omprakash Kaiwartya. "F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs." Journal of King Saud University - Computer and Information Sciences 29, no. 3 (2017): 269–80. http://dx.doi.org/10.1016/j.jksuci.2016.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Chang, Yang, Chen Xiaolin, and Zhang Huanguo. "A dynamic active multicast group access control framework based on trust management system." Wuhan University Journal of Natural Sciences 11, no. 6 (2006): 1809–13. http://dx.doi.org/10.1007/bf02831881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Yau, Stephen S., Yisheng Yao, and Arun Balaji Buduru. "An adaptable distributed trust management framework for large-scale secure service-based systems." Computing 96, no. 10 (2013): 925–49. http://dx.doi.org/10.1007/s00607-013-0354-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Sankar, S., Ramasubbareddy Somula, R. Lakshmana Kumar, P. Srinivasan, and M. Amala Jayanthi. "Trust-Aware Routing Framework for Internet of Things." International Journal of Knowledge and Systems Science 12, no. 1 (2021): 48–59. http://dx.doi.org/10.4018/ijkss.2021010104.

Full text
Abstract:
Establishing security in internet of things (IoT) is a critical challenge, as it is connected to the network's extremely resource-constrained devices. The RPL is a standard routing protocol for IoT. It is well-suited for low power and lossy networks (LLN). The RPL provides little security in the IoT network against various attacks. However, one needs to strengthen the security concern in RPL. So, this paper proposes a trust-aware, energy-based reliable routing (TAER-RPL) for IoT to enhance security among network nodes. The TAER-RPL is taken into account the routing metrics, namely trust, ETX,
APA, Harvard, Vancouver, ISO, and other styles
49

Pomponi, Francesco, Luciano Fratocchi, and Silvia Rossi Tafuri. "Trust development and horizontal collaboration in logistics: a theory based evolutionary framework." Supply Chain Management: An International Journal 20, no. 1 (2015): 83–97. http://dx.doi.org/10.1108/scm-02-2014-0078.

Full text
Abstract:
Purpose – The purpose of this article is to provide academicians and practitioners alike with a theory-based framework regarding horizontal collaboration in logistics. The proposed tool is based on an incremental perspective, according to two main dimensions: mutual trust among partners and the extent of the cooperation. Design/methodology/approach – This study used a “synthesising” approach to gauge potential contributions previously spread across different streams of research and disciplines that are now integrated into the framework. We conduct a deep literature review to characterise the h
APA, Harvard, Vancouver, ISO, and other styles
50

Dong, Yanan, Jing Jiang, Yan Rong, and Baiyin Yang. "LMX Differentiation and Voice Behavior: A Resource-Conservation Framework." Journal of Leadership & Organizational Studies 27, no. 3 (2020): 307–22. http://dx.doi.org/10.1177/1548051820911354.

Full text
Abstract:
The purpose of this article is to investigate how and when leader–member exchange (LMX) differentiation influences employees’ voice behavior by examining trust as a psychological process and two types of leader power as opposite moderators. Based on a sample of 61 teams from an energy corporation in China, we tested a moderated mediation model using multilevel structural equation modeling. The results show that LMX differentiation is negatively related to employees’ trust in leaders and, in turn, reduces employees’ voice behavior. Moreover, leader reward power negatively moderates the influenc
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!