Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    A User Authentication Protocol Combined with the Trust Model, Biometrics and ECC for Wireless Sensor Networks

    Tao Liu, Gan Huang*, Ping Zhang

    Intelligent Automation & Soft Computing, Vol.24, No.3, pp. 519-529, 2018, DOI:10.31209/2018.100000019

    Abstract In this article, a new user authentication protocol using trust model, elliptic curve cryptography and biometrics for WSNs is submitted. The result of the trust model analysis indicates that the model can improve the model’s ability of withstanding attacks from the malicious nodes. The results of safety analysis and performance analysis for our proposed user authentication protocol demonstrate that this protocol can be flexible to all sorts of common known attacks and performs similarly or better compared with some active user authentication protocols. It is suitable for WSNs which have a prominent request for the More >

  • Open Access

    ARTICLE

    Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing

    Weijin Jiang1, 2, 3, Yang Wang1,*, Yirong Jiang4,*, Yuhui Xu1, Jiahui Chen1, Lina Tan1, Guo Liang5

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 123-136, 2020, DOI:10.32604/cmc.2020.05933

    Abstract In mobile cloud computing, trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud. Aiming at the security and trust management of mobile agent system in mobile cloud computing environment, the Human Trust Mechanism (HTM) is used to study the subjective trust formation, trust propagation and trust evolution law, and the subjective trust dynamic management algorithm (MASTM) is proposed. Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust More >

  • Open Access

    ARTICLE

    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and More >

  • Open Access

    ARTICLE

    Dynamic Trust Model Based on Service Recommendation in Big Data

    Gang Wang1,*, Mengjuan Liu2

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 845-857, 2019, DOI:10.32604/cmc.2019.03678

    Abstract In big data of business service or transaction, it is impossible to provide entire information to both of services from cyber system, so some service providers made use of maliciously services to get more interests. Trust management is an effective solution to deal with these malicious actions. This paper gave a trust computing model based on service-recommendation in big data. This model takes into account difference of recommendation trust between familiar node and stranger node. Thus, to ensure accuracy of recommending trust computing, paper proposed a fine-granularity similarity computing method based on the similarity of More >

  • Open Access

    ARTICLE

    Research on Trust Model in Container-Based Cloud Service

    Xiaolan Xie1,2, Tianwei Yuan1,*, Xiao Zhou3, Xiaochun Cheng4

    CMC-Computers, Materials & Continua, Vol.56, No.2, pp. 273-283, 2018, DOI:10.3970/cmc.2018.03587

    Abstract Container virtual technology aims to provide program independence and resource sharing. The container enables flexible cloud service. Compared with traditional virtualization, traditional virtual machines have difficulty in resource and expense requirements. The container technology has the advantages of smaller size, faster migration, lower resource overhead, and higher utilization. Within container-based cloud environment, services can adopt multi-target nodes. This paper reports research results to improve the traditional trust model with consideration of cooperation effects. Cooperation trust means that in a container-based cloud environment, services can be divided into multiple containers for different container nodes. When multiple More >

Displaying 11-20 on page 2 of 15. Per Page