A trust-based security mechanism for nomadic users in pervasive systems

被引:0
作者
Djedid, Mohammed Nadir [1 ]
机构
[1] Department of computer science, University of Sciences and Technology of Oran-Mohamed Boudiaf, Oran, 31000, Algeria
来源
International Journal of Computer Science Issues | 2012年 / 9卷 / 5 5-1期
关键词
Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of network technologies and the appearance of new varied applications in terms of services and resources, has created new security problems for which existing solutions and mechanisms are inadequate, especially problems of identification and authentication. In a highly distributed and pervasive system, a uniform and centralized security management is not an option. It then becomes necessary to give more autonomy to security systems by providing them with mechanisms that allows a dynamic and flexible cooperation and collaboration between the actors in the system. © 2012 International Journal of Computer Science Issues.
引用
收藏
页码:359 / 365
相关论文
共 43 条
[21]   Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network [J].
Zhou, Jingxian ;
Wang, Zengqi .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (04) :1773-1795
[22]   The Security of IP-Based Video Surveillance Systems [J].
Kalbo, Naor ;
Mirsky, Yisroel ;
Shabtai, Asaf ;
Elovici, Yuval .
SENSORS, 2020, 20 (17) :1-27
[23]   A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems [J].
Kim, Jeonghyeon ;
Lingga, Patrick ;
Jeong, Jaehoon Paul ;
Choi, Yunchul ;
Park, JungSoo .
36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, :454-459
[24]   The design of network security protection trust management system based on an improved hidden Markov model [J].
Chen, Shaojun .
EURASIP JOURNAL ON INFORMATION SECURITY, 2023, 2023 (01)
[25]   The Research of the Network Security Situation Prediction mechanism Based on the complex network [J].
Sun, Shouxin .
2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, :1183-1187
[26]   A Proposal for Information Systems Security Monitoring Based on Large Datasets [J].
Hai Van Pham ;
Moore, Philip .
INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2018, 9 (02) :16-26
[27]   Active defense mechanism for network security situation prediction based on transformer and TCN [J].
Chen, Huanying .
ENGINEERING RESEARCH EXPRESS, 2025, 7 (02)
[28]   A security policy and Network Cartography based Intrusion Detection and Prevention Systems [J].
Meharouech, Sourour ;
Bouhoula, Adel ;
Abbes, Tarek .
JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04) :279-291
[29]   Security analysis model of intrusion tolerant systems based on game theory [J].
Zhou, Hua ;
Zhou, Hai-Jun ;
Ma, Jian-Feng .
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (08) :1933-1939
[30]   Intelligent agents model for network security based on artificial immune systems [J].
Yang, Jin ;
Li, Tao ;
Wang, Tiefang ;
Gong, Xun ;
Jiang, Yaping ;
Xu, Chun ;
Sun, FeiXian .
DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 :673-679