Showing 1 - 20 results of 249 for search 'computational trust', query time: 0.07s Refine Results
  1. 1

    Trusted Computing Strengthens Cloud Authentication by Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Mojtaba Alizadeh

    Published 2014-01-01
    “…This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. …”
    Get full text
    Article
  2. 2

    A Method for Trust Quantification in Cloud Computing Environments by Xiaohui Li, Jingsha He, Bin Zhao, Jing Fang, Yixuan Zhang, Hongxing Liang

    Published 2016-02-01
    “…In this paper, we propose a method for trust quantification based on fuzzy comprehensive evaluation theory for cloud computing to protect user data through trust quantification of cloud services after we introduce trust ontology for cloud services and define user preference trust values. …”
    Get full text
    Article
  3. 3

    Secure OpenID Authentication Model by Using Trusted Computing by E. Ghazizadeh, Z. S. Shams Dolatabadi, R. Khaleghparast, M. Zamani, A. A. Manaf, M. S. Abdullah

    Published 2014-01-01
    “…Single sign-on (SSO) and OpenID have been used to decrease the complexity of managing numerous accounts required in the Internet identity environment. Trusted Platform Module (TPM) and Trust Multitenancy are great trusted computing-based technologies to solve security concerns in the Internet identity environment. …”
    Get full text
    Article
  4. 4
  5. 5

    Fuzzy logic based social trust computation scheme in Flying Ad-hoc network by Joydeep Kundu, Sahabul Alam, Arindam Dey

    Published 2025-03-01
    “…This paper describes a social trust computation scheme for clustered-based FANET, which utilises a reputable methodology to separate malicious UAVs within FANET. …”
    Get full text
    Article
  6. 6
  7. 7

    Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges by Mohammad Faisal, Ikram Ali, Muhammad Sajjad Khan, Su Min Kim, Junsu Kim

    Published 2020-01-01
    “…The prevention of this risk is a big research issue and it needs to be solved. There is a need for trusted IOT computing in recent times to provide trusted services. …”
    Get full text
    Article
  8. 8

    A hybrid trust model based on communication and social trust for vehicular social networks by Na Fan, Shuai Shen, Chase Q Wu, Junfeng Yao

    Published 2022-05-01
    “…Based on these two trust models, we compute the combined trust assessment of a vehicle node in vehicular social networks. …”
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    A Trusted Federated Learning Method Based on Consortium Blockchain by Xiaojun Yin, Xijun Wu, Xinming Zhang

    Published 2024-12-01
    “…However, traditional FL methods face challenges in ensuring trust, security, and efficiency, particularly in heterogeneous environments with varying computational capacities. …”
    Get full text
    Article
  17. 17

    Trusted fuzzy routing scheme in flying ad-hoc network by Sahabul Alam, Joydeep Kundu, Shivnath Ghosh, Arindam Dey

    Published 2024-03-01
    “…It recommends fuzzy logic, one of the most widely utilized techniques for trusted route computing, for this purpose. Fuzzy logic can manage complicated settings by classifying nodes based on various criteria. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20