A trust-based security mechanism for nomadic users in pervasive systems

被引:0
作者
Djedid, Mohammed Nadir [1 ]
机构
[1] Department of computer science, University of Sciences and Technology of Oran-Mohamed Boudiaf, Oran, 31000, Algeria
来源
International Journal of Computer Science Issues | 2012年 / 9卷 / 5 5-1期
关键词
Network security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of network technologies and the appearance of new varied applications in terms of services and resources, has created new security problems for which existing solutions and mechanisms are inadequate, especially problems of identification and authentication. In a highly distributed and pervasive system, a uniform and centralized security management is not an option. It then becomes necessary to give more autonomy to security systems by providing them with mechanisms that allows a dynamic and flexible cooperation and collaboration between the actors in the system. © 2012 International Journal of Computer Science Issues.
引用
收藏
页码:359 / 365
相关论文
共 42 条
[31]   Load-based dynamic flow scheduling in network security monitoring systems [J].
Zhang, Jiaqi ;
Ma, Xiujuan ;
Zou, Xin ;
Wang, Lidong .
2016 26TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2016, :76-79
[32]   Enhancing Security of Host-Based Intrusion Detection Systems for the Internet of Things [J].
Nallakaruppan, M. K. ;
Somayaji, Siva Rama Krishnan ;
Fuladi, Siddhesh ;
Benedetto, Francesco ;
Ulaganathan, Senthil Kumaran ;
Yenduri, Gokul .
IEEE ACCESS, 2024, 12 :31788-31797
[33]   AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing [J].
Chao, Han-Chieh ;
Wu, Hsin-Te ;
Tseng, Fan-Hsun .
SUSTAINABILITY, 2021, 13 (06)
[34]   A novel honeypot based security approach for real-time intrusion detection and prevention systems [J].
Baykara, Muhammet ;
Das, Resul .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 :103-116
[35]   Prediction of Network Security Situation Based on Attention Mechanism and Convolutional Neural Network-Gated Recurrent Unit [J].
Feng, Yuan ;
Zhao, Hongying ;
Zhang, Jianwei ;
Cai, Zengyu ;
Zhu, Liang ;
Zhang, Ran .
APPLIED SCIENCES-BASEL, 2024, 14 (15)
[36]   Research on Electric Power Information Systems Network Security Situation Awareness Based on Big Data Technology [J].
Liu, Dong-Lan ;
Li, Dong ;
Ma, Lei ;
Liu, Xin ;
Yu, Hao ;
Chang, Ying-Xian ;
Chen, Jian-Fei .
PROCEEDINGS OF THE 3RD ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2017), 2017, 131 :540-547
[37]   Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment [J].
Sourour, Meharouech ;
Adel, Bouhoula ;
Tarek, Abbes .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (04) :472-495
[38]   Network Security Alerts Management Architecture for Signature-Based Intrusions Detection Systems within a NAT Environment [J].
Meharouech Sourour ;
Bouhoula Adel ;
Abbes Tarek .
Journal of Network and Systems Management, 2011, 19 :472-495
[39]   An assessment of technology-based service encounters & network security on the e-health care systems of medical centers in Taiwan [J].
Hsin Hsin Chang ;
Ching Sheng Chang .
BMC Health Services Research, 8
[40]   Graph Computing Based Security Constrained Unit Commitment in Hydro-thermal Power Systems Incorporating Pumped Hydro Storage [J].
Wei, Longfei ;
Liu, Guangyi ;
Yan, Shen ;
Dai, Renchang ;
Tang, Yachen .
CSEE JOURNAL OF POWER AND ENERGY SYSTEMS, 2021, 7 (03) :485-496