Sign Up to like & get
recommendations!
1
Published in 2018 at "Soft Computing"
DOI: 10.1007/s00500-017-2730-4
Abstract: Considering the existence of a wide range of web services and their diversity, selecting a service with the best performance among similar services remains a challenge for the demanding users. However, sometimes it is necessary…
read more here.
Keywords:
web services;
trust evaluation;
trust;
model ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Kybernetes"
DOI: 10.1108/k-02-2017-0070
Abstract: Purpose Cloud services have become very popular among researchers and people recently. In such a scenario, identifying reliable cloud services has become very important. The trust value plays a significant role in recognizing reliable providers.…
read more here.
Keywords:
method;
trust evaluation;
cloud;
trust ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3244933
Abstract: Due to the technical characteristics and application scenarios of distributed networks, their nodes can easily be invaded and compromised. It will result in information being forged or tampered without difficulty. An effective scheme to guarantee…
read more here.
Keywords:
trust evaluation;
decision;
evidence theory;
evaluation decision ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2917763
Abstract: In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes have played a pivotal role in addressing nodes’ misbehavior…
read more here.
Keywords:
sensor enabled;
trust;
game;
trust evaluation ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3179428
Abstract: With the development of the Industrial Internet of Things (IIoT) technology, edge computing is a promising area to release the sensing and computing burdens from the overloaded center. However, in edge network scenarios, we cannot…
read more here.
Keywords:
trust evaluation;
framework;
trust;
malicious behaviors ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2017.2740279
Abstract: A sensor-cloud system is a combination of wireless sensor networks and cloud computing that is equipped with ubiquitous physical sensing ability, high-speed computation, huge storage, and so on. However, sensor-cloud systems suffer from various types…
read more here.
Keywords:
sensor cloud;
evaluation;
cloud system;
trust evaluation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Wireless Communications"
DOI: 10.1109/mwc.001.2000325
Abstract: Integrating artificial intelligence (AI) with mobile edge computing, edge intelligence (EI) has emerged as a new paradigm for 5G and beyond 5G (B5G) systems. The integration of EI and heterogeneous networks (e.g., mobile and wireless…
read more here.
Keywords:
edge intelligence;
authentication;
trust evaluation;
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3199268
Abstract: Service composition enables the flexible and agile collaboration of multiple services to complete personalized manufacturing tasks in cloud manufacturing. Compared with traditional manufacturing mode and cloud computing, trust problems become more serious and crucial in…
read more here.
Keywords:
trust evaluation;
cloud manufacturing;
trust;
service composition ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24020243
Abstract: Web services have the advantage of being able to generate new value-added services based on existing services. To effectively compose Web services, the composition process necessitates that the services that will participate in a given…
read more here.
Keywords:
web service;
methodology;
trust evaluation;
service ... See more keywords