Articles with "trust evaluation" as a keyword



Photo by kellysikkema from unsplash

An approach based on the transferrable belief model for trust evaluation in web services

Sign Up to like & get
recommendations!
Published in 2018 at "Soft Computing"

DOI: 10.1007/s00500-017-2730-4

Abstract: Considering the existence of a wide range of web services and their diversity, selecting a service with the best performance among similar services remains a challenge for the demanding users. However, sometimes it is necessary… read more here.

Keywords: web services; trust evaluation; trust; model ... See more keywords
Photo from wikipedia

A method for trust evaluation in the cloud environments using a behavior graph and services grouping

Sign Up to like & get
recommendations!
Published in 2017 at "Kybernetes"

DOI: 10.1108/k-02-2017-0070

Abstract: Purpose Cloud services have become very popular among researchers and people recently. In such a scenario, identifying reliable cloud services has become very important. The trust value plays a significant role in recognizing reliable providers.… read more here.

Keywords: method; trust evaluation; cloud; trust ... See more keywords
Photo by krakenimages from unsplash

Trust Evaluation and Decision Based on D-S Evidence Theory: Early Models and Future Perspectives

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3244933

Abstract: Due to the technical characteristics and application scenarios of distributed networks, their nodes can easily be invaded and compromised. It will result in information being forged or tampered without difficulty. An effective scheme to guarantee… read more here.

Keywords: trust evaluation; decision; evidence theory; evaluation decision ... See more keywords
Photo by mluotio83 from unsplash

Trust Evaluation for Light Weight Security in Sensor Enabled Internet of Things: Game Theory Oriented Approach

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2917763

Abstract: In sensor-enabled Internet of Things (IoT), nodes are deployed in an open and remote environment, therefore, are vulnerable to a variety of attacks. Recently, trust-based schemes have played a pivotal role in addressing nodes’ misbehavior… read more here.

Keywords: sensor enabled; trust; game; trust evaluation ... See more keywords
Photo by krakenimages from unsplash

Toward a Trust Evaluation Framework Against Malicious Behaviors of Industrial IoT

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3179428

Abstract: With the development of the Industrial Internet of Things (IIoT) technology, edge computing is a promising area to release the sensing and computing burdens from the overloaded center. However, in edge network scenarios, we cannot… read more here.

Keywords: trust evaluation; framework; trust; malicious behaviors ... See more keywords
Photo by lukaszlada from unsplash

Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2017.2740279

Abstract: A sensor-cloud system is a combination of wireless sensor networks and cloud computing that is equipped with ubiquitous physical sensing ability, high-speed computation, huge storage, and so on. However, sensor-cloud systems suffer from various types… read more here.

Keywords: sensor cloud; evaluation; cloud system; trust evaluation ... See more keywords
Photo by disfruta_cafe from unsplash

Edge-Intelligence-Empowered, Unified Authentication and Trust Evaluation for Heterogeneous Beyond 5G Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Wireless Communications"

DOI: 10.1109/mwc.001.2000325

Abstract: Integrating artificial intelligence (AI) with mobile edge computing, edge intelligence (EI) has emerged as a new paradigm for 5G and beyond 5G (B5G) systems. The integration of EI and heterogeneous networks (e.g., mobile and wireless… read more here.

Keywords: edge intelligence; authentication; trust evaluation;
Photo by ldxcreative from unsplash

Trust Evaluation for Service Composition in Cloud Manufacturing Using GRU and Association Analysis

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3199268

Abstract: Service composition enables the flexible and agile collaboration of multiple services to complete personalized manufacturing tasks in cloud manufacturing. Compared with traditional manufacturing mode and cloud computing, trust problems become more serious and crucial in… read more here.

Keywords: trust evaluation; cloud manufacturing; trust; service composition ... See more keywords
Photo from wikipedia

A Comprehensive and Unified Approach to Web Service Trust Evaluation Based on Uncertainty Methodology

Sign Up to like & get
recommendations!
Published in 2022 at "Entropy"

DOI: 10.3390/e24020243

Abstract: Web services have the advantage of being able to generate new value-added services based on existing services. To effectively compose Web services, the composition process necessitates that the services that will participate in a given… read more here.

Keywords: web service; methodology; trust evaluation; service ... See more keywords