Surveying and analyzing security, privacy and trust issues in cloud computing environments

D Sun, G Chang, L Sun, X Wang - Procedia Engineering, 2011 - Elsevier
Cloud computing is still in its infancy in spite of gaining tremendous momentum recently,
high security is one of the major obstacles for opening up the new era of the long dreamed …

Detecting unfair recommendations in trust-based pervasive environments

G D'Angelo, F Palmieri, S Rampone - Information Sciences, 2019 - Elsevier
In pervasive/ubiquitous computing environments, interacting users may evaluate their
respective trustworthiness by using historical data coming from their past interactions …

A decade of security research in ubiquitous computing: results of a systematic literature review

E Kusen, M Strembeck - International Journal of Pervasive Computing …, 2016 - emerald.com
Purpose Ever since Mark Weiser coined the term “ubiquitous computing”(ubicomp) in 1988,
there has been a general interest in proposing various solutions that would support his …

Trust management for multimedia P2P applications in autonomic networking

F Almenárez, A Marín, D Díaz, A Cortés, C Campo… - Ad Hoc Networks, 2011 - Elsevier
In the last years, trust management has become a fundamental basis for facilitating the
cooperation between different users in peer-to-peer (P2P) multimedia applications within …

A mechanism for detecting dishonest recommendation in indirect trust computation

N Iltaf, A Ghafoor, U Zia - EURASIP Journal on Wireless Communications …, 2013 - Springer
Indirect trust computation based on recommendations form an important component in trust-
based access control models for pervasive environment. It can provide the service provider …

A framework for security of public cloud environment

M Lata, V Kumar - … Journal of Electronic Security and Digital …, 2024 - inderscienceonline.com
The majority of organisations tend to subcontract the computational requirements toward
public cloud services to minimise capital expenses. However, the desire of minimum cost …

[PDF][PDF] A novel trust management system for cloud computing IaaS providers

PD Manuel, MI Abd-El Barr… - JCMCC-Journal of …, 2011 - academia.edu
Trust is one of the most important means to improve the reliability of computing resources
provided in cloud environment and it plays an important role in commercial cloud …

[HTML][HTML] Trust prediction in online social rating networks

AMT Ali-Eldin - Ain Shams Engineering Journal, 2018 - Elsevier
Previous research on trust prediction in online social rating networks focused on users'
history of interactions in evaluating the reputation of other users, service providers or …

Modeling interaction using trust and recommendation in ubiquitous computing environment

N Iltaf, A Ghafoor, M Hussain - EURASIP Journal on Wireless …, 2012 - Springer
To secure computing in pervasive environment, an adaptive trust and recommendation
based access control model (based on human notion of trust) is proposed. The proposed …

A survey of reputation and trust mechanism in peer-to-peer network

G Shang-Fu, Z Jian-Lei - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
Security issue is becoming increasingly more important in the field of P2P (Peer-to-Peer)
technology due to its intrinsic properties, eg anonymous, dynamic, open etc. Reputation and …