A trust-based security mechanism for nomadic users in pervasive systems

被引:0
作者
Djedid, Mohammed Nadir [1 ]
机构
[1] Department of computer science, University of Sciences and Technology of Oran-Mohamed Boudiaf, Oran, 31000, Algeria
来源
International Journal of Computer Science Issues | 2012年 / 9卷 / 5 5-1期
关键词
Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of network technologies and the appearance of new varied applications in terms of services and resources, has created new security problems for which existing solutions and mechanisms are inadequate, especially problems of identification and authentication. In a highly distributed and pervasive system, a uniform and centralized security management is not an option. It then becomes necessary to give more autonomy to security systems by providing them with mechanisms that allows a dynamic and flexible cooperation and collaboration between the actors in the system. © 2012 International Journal of Computer Science Issues.
引用
收藏
页码:359 / 365
相关论文
共 42 条
  • [21] Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network
    Zhou, Jingxian
    Wang, Zengqi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (04): : 1773 - 1795
  • [22] The Security of IP-Based Video Surveillance Systems
    Kalbo, Naor
    Mirsky, Yisroel
    Shabtai, Asaf
    Elovici, Yuval
    SENSORS, 2020, 20 (17) : 1 - 27
  • [23] A Web-Based Monitoring System of Network Security Functions in Blockchain-Based Cloud Security Systems
    Kim, Jeonghyeon
    Lingga, Patrick
    Jeong, Jaehoon Paul
    Choi, Yunchul
    Park, JungSoo
    36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 454 - 459
  • [24] The design of network security protection trust management system based on an improved hidden Markov model
    Chen, Shaojun
    EURASIP JOURNAL ON INFORMATION SECURITY, 2023, 2023 (01)
  • [25] The Research of the Network Security Situation Prediction mechanism Based on the complex network
    Sun, Shouxin
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1183 - 1187
  • [26] A Proposal for Information Systems Security Monitoring Based on Large Datasets
    Hai Van Pham
    Moore, Philip
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2018, 9 (02) : 16 - 26
  • [27] Security analysis model of intrusion tolerant systems based on game theory
    Zhou, Hua
    Zhou, Hai-Jun
    Ma, Jian-Feng
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2013, 35 (08): : 1933 - 1939
  • [28] Intelligent agents model for network security based on artificial immune systems
    Yang, Jin
    Li, Tao
    Wang, Tiefang
    Gong, Xun
    Jiang, Yaping
    Xu, Chun
    Sun, FeiXian
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 673 - 679
  • [29] A security policy and Network Cartography based Intrusion Detection and Prevention Systems
    Meharouech, Sourour
    Bouhoula, Adel
    Abbes, Tarek
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 279 - 291
  • [30] RETRACTED ARTICLE: The design of network security protection trust management system based on an improved hidden Markov model
    Shaojun Chen
    EURASIP Journal on Information Security, 2023