-
1
Trusted Computing Strengthens Cloud Authentication
Published 2014-01-01“…This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. …”
Get full text
Article -
2
A Method for Trust Quantification in Cloud Computing Environments
Published 2016-02-01“…In this paper, we propose a method for trust quantification based on fuzzy comprehensive evaluation theory for cloud computing to protect user data through trust quantification of cloud services after we introduce trust ontology for cloud services and define user preference trust values. …”
Get full text
Article -
3
Secure OpenID Authentication Model by Using Trusted Computing
Published 2014-01-01“…Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. …”
Get full text
Article -
4
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01Subjects: Get full text
Article -
5
Fuzzy logic based social trust computation scheme in Flying Ad-hoc network
Published 2025-03-01“…This paper describes a social trust computation scheme for clustered-based FANET, which utilises a reputable methodology to separate malicious UAVs within FANET. …”
Get full text
Article -
6
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01Subjects: Get full text
Article -
7
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
Published 2020-01-01“…The prevention of this risk is a big research issue and it needs to be solved. There is a need for trusted IOT computing in recent times to provide trusted services. …”
Get full text
Article -
8
A hybrid trust model based on communication and social trust for vehicular social networks
Published 2022-05-01“…Based on these two trust models, we compute the combined trust assessment of a vehicle node in vehicular social networks. …”
Get full text
Article -
9
Trust information network in social Internet of things using trust-aware recommender systems
Published 2020-04-01Get full text
Article -
10
Designing an internet of things laboratory to improve student understanding of secure IoT systems
Published 2024-01-01Subjects: Get full text
Article -
11
Probabilistic Trust Evaluation with Inaccurate Reputation Reports
Published 2015-06-01Get full text
Article -
12
-
13
LTEM: Lightweight Trust Evaluation Model in IoT Environment
Published 2024-06-01Get full text
Article -
14
GTrust: Group Extension for Trust Models in Distributed Systems
Published 2014-02-01Get full text
Article -
15
Trusting AI: does uncertainty visualization affect decision-making?
Published 2025-02-01Get full text
Article -
16
A Trusted Federated Learning Method Based on Consortium Blockchain
Published 2024-12-01“…However, traditional FL methods face challenges in ensuring trust, security, and efficiency, particularly in heterogeneous environments with varying computational capacities. …”
Get full text
Article -
17
Trusted fuzzy routing scheme in flying ad-hoc network
Published 2024-03-01“…It recommends fuzzy logic, one of the most widely utilized techniques for trusted route computing, for this purpose. Fuzzy logic can manage complicated settings by classifying nodes based on various criteria. …”
Get full text
Article -
18
Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks
Published 2013-10-01Get full text
Article -
19
Embedding Trust in the Media Access Control Protocol for Wireless Networks
Published 2025-01-01Get full text
Article -
20
Trust evaluation model of cloud user based on behavior data
Published 2018-05-01Get full text
Article