Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240200109-6.doi: 10.11896/jsjkx.240200109
• Interdiscipline & Application • Previous Articles Next Articles
HUANG Jianhui1,2, ZHANG Jiangjiang1,2, SHEN Changxiang1,2, ZHANG Jianbiao1,2, WANG liang3
CLC Number:
[1]ALWARAFY A,AL-THELAYA K A,ABDALLAH M,et al.A survey on security and privacy issues in edge-computing-assisted internet of things[J].IEEE Internet of Things Journal,2020,8(6):4004-4022. [2]LIU L,MA Z,MENG W.Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks[J].Future Generation Computer Systems,2019,101:865-879. [3]SOUISSI I,AZZOUNA N B,SAID L B.A multi-level study ofinformation trust models in WSN-assisted IoT[J].Computer Networks,2019,151:12-30. [4]HE Y,YU F R,WEI Z,et al.Trust management for secure cognitive radio vehicular ad hoc networks[J].Ad Hoc Networks,2019,86:154-165. [5]LU Z,QU G,LIU Z.A survey on recent advances in vehicular network security,trust,and privacy[J].IEEE Transactions on Intelligent Transportation Systems,2018,20(2):760-776. [6]DAS R,DASH D,SARKAR M K.HTMS:fuzzy based hierarchical trust management scheme in WSN[J].Wireless Personal Communications,2020,112(2):1079-1112. [7]ALNASSER A,SUN H,JIANG J.Recommendation-based trust model for vehicle-to-everything(V2X)[J].IEEE Internet of Things Journal,2019,7(1):440-450. [8]SHAYESTEH B,HAKAMI V,AKBARIA.A trust manage-ment scheme for IoT-enabled environmental health/accessibility monitoring services[J].International Journal of Information Security,2020,19(1):93-110. [9]SHEN C X.Building Cyber Security Defense by Trusted Computing 3.0[J].Journal of Information Security Research,2017,3(4):290-298. [10]GB/T 40650-2021.可信平台控制模块[S].北京:中国标准出版社,2021. [11]HUANG J H,SHEN C X,XIE W L.The TPCM 3P3C Defense Architecture of Safety and Trusted Platform [J].J.Wuhan Univ.(Nat.SCI.Ed.),2018,64(2):109-114. [12]ZHANG J,NING Z,CAO H.An Intelligent Trusted Edge Data Production Method for Distributed Internet of Things,Neural Computing and Applications[J].Neural Computing & Applications,2023,35(29):21333-21347. [13]ZHANG J,NING Z,WAQAS R A M,et al.A Many-objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem[J],IEEE Transactions on Mobile Computing,2023,23(2):1330-1346. [14]SINGH J,BELLO Y,HUSSEINA R,et al.Hierarchical Security Paradigm for IoT Multiaccess Edge Computing[J].IEEE Internet Things J.,2021,8(7):5794-5805. [15]ZHANG P,JIANG C,PANG X,et al.STEC-IoT:A Security Tactic by Virtualizing Edge Computing on IoT[J].IEEE Internet Things J.,2021,8(4):2459-2467. [16]BASSET M A,MANOGARAN G,MOHAMED M.A Neutrosophic theory based security approach for fog and mobile-edge computing[J].Computer Networks,2019,157:122-132. [17]ELGENDY I A,ZHANG W,TIAN Y C,et al.Resource allocation and computation offloading with data security for mobile edge computing[J].Future Generation Computer Systems,2019,100:531-541. [18]TSAI J L,LO N W.A Privacy-Aware Authentication Schemefor Distributed Mobile Cloud Computing Services[J].IEEE Systems Journal,2017,9(3):805-815. [19]HUANG B,LI Z,TANG P,et al.Security modeling and efficient computation offloading for service workflow in mobile edge computing[J].Future Generation Computer Systems,2019,97:755-774. [20]AAKASH B,ZACHARY E,ZACHARY K,et al.Graph Context Encoding for Neural Source Code Summarization[J].IEEE Transactions on Software Engineering,2023,49(9):4268- 4281. [21]HUANG J H,SHEN C X.Trusted Platform Design of Serverwith TPCM Active Defense [J].Journal of Zhengzhou University(Natural Science Edition),2019,51(3):1-6. |
[1] | YANG Yu-li, LI Yu-hang, DENG An-hua. Trust Evaluation Model of Cloud Manufacturing Services for Personalized Needs [J]. Computer Science, 2022, 49(3): 354-359. |
[2] | ZHANG Guang-hua, YANG Yao-hong, ZHANG Dong-wen, LI Jun. Secure Routing Mechanism Based on Trust Against Packet Dropping Attack in Internet of Things [J]. Computer Science, 2019, 46(6): 153-161. |
[3] | XU Xue-fei, LI Jian-hua, YANG Ying-hui and GUO Rong. Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model [J]. Computer Science, 2016, 43(9): 169-174. |
[4] | YOU Jing, FENG Hui and SUN Yu-qiang. Trust Evaluation and Service Selection Based on Collaborative Recommendation for Cloud Environment [J]. Computer Science, 2016, 43(5): 140-145. |
[5] | ZHOU Guo-qiang, LIU Hong-fang and WANG Zi-yuan. Trust Evaluation Model with Eliminating Random Recommendation [J]. Computer Science, 2016, 43(4): 155-159. |
[6] | YANG Yong-fei, LIU Guang-jie and DAI Yue-wei. Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network [J]. Computer Science, 2015, 42(Z6): 388-392. |
[7] | LI Jian-li, DENG Xiao, WANG Yi-mou and XIE Yue. Security and Efficiency Negotiation Model [J]. Computer Science, 2015, 42(Z6): 378-381. |
[8] | WANG Jun, LIU Wen-fen and GAO Yan. Trust Model of Cloud Computing Based on Multi-parameters Evaluation [J]. Computer Science, 2015, 42(Z6): 315-320. |
[9] | YANG Lei,WANG Xing-wei and HUANG Min. k-Hop Backtracking Trusted QoS Rerouting Mechanism [J]. Computer Science, 2014, 41(5): 78-81. |
[10] | WANG Jin-dong,WEI Bo,ZHANG Heng-wei and He Jia-jing. Research on Service Trust Evaluation Approach under Cloud Computing Environment [J]. Computer Science, 2014, 41(12): 38-42. |
[11] | . Data Consistency Trust Evaluation of Wireless Sensor Networks Based on Multi-event Concurrent [J]. Computer Science, 2013, 40(3): 163-166. |
[12] | . Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment [J]. Computer Science, 2013, 40(1): 132-135. |
[13] | LI Li-miao,CHEN Zhi-gang,DENG Xiao-heng,GUI Jing-song. Research of Trust Evaluation Model Based on Reputation and Cooperation [J]. Computer Science, 2011, 38(5): 41-44. |
[14] | WANG Chang-da,HUA Ming-hui,ZHOU Cong-hua,SONG Xiang-mei,JU Shi-guang. Security Analysis of Access Control Policy Based on Predicate Abstract and Verification Space Division [J]. Computer Science, 2011, 38(10): 55-59. |
[15] | . [J]. Computer Science, 2006, 33(8): 98-99. |
|