메뉴 건너뛰기




Volumn 25, Issue 2, 2014, Pages 310-320

Enabling trustworthy service evaluation in service-oriented mobile social networks

Author keywords

distributed system; Mobile social networks; sybil attack; trust evaluation

Indexed keywords

AGGREGATE SIGNATURE; DISTRIBUTED SYSTEMS; MOBILE SOCIAL NETWORKS; MODIFICATION ATTACK; SERVICE EVALUATION; SYBIL ATTACK; TRUST EVALUATION; TRUSTED AUTHORITIES;

EID: 84891775418     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2013.37     Document Type: Article
Times cited : (56)

References (31)
  • 1
    • 79960871684 scopus 로고    scopus 로고
    • Secure friend discovery in mobile social networks
    • W. Dong, V. Dave, L. Qiu, and Y. Zhang, Secure Friend Discovery in Mobile Social Networks, Proc. IEEE INFOCOM, pp. 1647-1655, 2011.
    • (2011) Proc. IEEE INFOCOM , pp. 1647-1655
    • Dong, W.1    Dave, V.2    Qiu, L.3    Zhang, Y.4
  • 3
    • 84866513570 scopus 로고    scopus 로고
    • Morality-driven data forwarding with privacy preservation in mobile social networks
    • Sept.
    • X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen, Morality-Driven Data Forwarding with Privacy Preservation in Mobile Social Networks, IEEE Trans. Vehicular Technology, vol. 61, no. 7, pp. 3209-3222, Sept. 2012.
    • (2012) IEEE Trans. Vehicular Technology , vol.61 , Issue.7 , pp. 3209-3222
    • Liang, X.1    Li, X.2    Luan, T.3    Lu, R.4    Lin, X.5    Shen, X.6
  • 7
    • 77953317298 scopus 로고    scopus 로고
    • Sybil attacks against mobile users: Friends and foes to the rescue
    • D. Quercia and S. Hailes, Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue, Proc. IEEE INFOCOM, pp. 336-340, 2010.
    • (2010) Proc. IEEE INFOCOM , pp. 336-340
    • Quercia, D.1    Hailes, S.2
  • 8
    • 84857789593 scopus 로고    scopus 로고
    • A dynamic privacy-preserving key management scheme for location-based services in vanets
    • Mar
    • R. Lu, X. Lin, X. Liang, and X. Shen, A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs, IEEE Trans. Intelligent Transportation Systems, vol. 13, no. 1, pp. 127-139, Mar. 2012.
    • (2012) IEEE Trans. Intelligent Transportation Systems , vol.13 , Issue.1 , pp. 127-139
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 9
    • 84856182115 scopus 로고    scopus 로고
    • Pseudonym changing at social spots: An effective strategy for location privacy in vanets
    • Jan.
    • R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen, Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs, IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan. 2012.
    • (2012) IEEE Trans. Vehicular Technology , vol.61 , Issue.1 , pp. 86-96
    • Lu, R.1    Lin, X.2    Luan, T.3    Liang, X.4    Shen, X.5
  • 13
    • 78751639836 scopus 로고    scopus 로고
    • Adaptive location-oriented content delivery in delay-sensitive pervasive applications
    • Mar
    • Y. Zhang, Z. Wu, and W. Trappe, Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications, IEEE Trans. Mobile Computing, vol. 10, no. 3, pp. 362-376, Mar. 2011.
    • (2011) IEEE Trans. Mobile Computing , vol.10 , Issue.3 , pp. 362-376
    • Zhang, Y.1    Wu, Z.2    Trappe, W.3
  • 14
    • 64049112040 scopus 로고    scopus 로고
    • Service discovery in mobile ad hoc networks based on grid
    • Mar
    • H. Tsai, T. Chen, and C. Chu, Service Discovery in Mobile Ad Hoc Networks Based on Grid, IEEE Trans. Vehicular Technology, vol. 58, no. 3, pp. 1528-1545, Mar. 2009.
    • (2009) IEEE Trans. Vehicular Technology , vol.58 , Issue.3 , pp. 1528-1545
    • Tsai, H.1    Chen, T.2    Chu, C.3
  • 15
    • 84870434696 scopus 로고    scopus 로고
    • Toward privacy preserving and collusion resistance in a location proof updating system
    • Jan
    • Z. Zhu and G. Cao, Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System, IEEE Trans. Mobile Computing, vol. 12, no. 1, pp. 51-64, Jan. 2013.
    • (2013) IEEE Trans. Mobile Computing , vol.12 , Issue.1 , pp. 51-64
    • Zhu, Z.1    Cao, G.2
  • 16
    • 70350266232 scopus 로고    scopus 로고
    • Factors affecting the online travel buying decision: A review
    • I. Wen, Factors Affecting the Online Travel Buying Decision: A Review, Int'l J. Contemporary Hospitality Management, vol. 21, no. 6, pp. 752-765, 2009.
    • (2009) Int'l J. Contemporary Hospitality Management , vol.21 , Issue.6 , pp. 752-765
    • Wen, I.1
  • 17
    • 67650211063 scopus 로고    scopus 로고
    • Tisa: Toward trustworthy services in a service-oriented architecture
    • Oct -Dec
    • H. Rajan and M. Hosamani, Tisa: Toward Trustworthy Services in a Service-Oriented Architecture, IEEE Trans. Services Computing, vol. 1, no. 4, pp. 201-213, Oct.-Dec. 2008.
    • (2008) IEEE Trans. Services Computing , vol.1 , Issue.4 , pp. 201-213
    • Rajan, H.1    Hosamani, M.2
  • 18
    • 81455142681 scopus 로고    scopus 로고
    • Two-dimensional trust rating aggregations in service-oriented applications
    • Oct-Dec
    • Y. Wang and L. Li, Two-Dimensional Trust Rating Aggregations in Service-Oriented Applications, IEEE Trans. Service Computing, vol. 4, no. 4, pp. 257-271, Oct.-Dec. 2011.
    • (2011) IEEE Trans. Service Computing , vol.4 , Issue.4 , pp. 257-271
    • Wang, Y.1    Li, L.2
  • 19
    • 84858666726 scopus 로고    scopus 로고
    • Iterative trust and reputation management using belief propagation
    • May/June
    • E. Ayday and F. Fekri, Iterative Trust and Reputation Management Using Belief Propagation, IEEE Trans. Dependable and Secure Computing, vol. 9, no. 3, pp. 375-386, May/June 2012.
    • (2012) IEEE Trans. Dependable and Secure Computing , vol.9 , Issue.3 , pp. 375-386
    • Ayday, E.1    Fekri, F.2
  • 20
    • 84856255130 scopus 로고    scopus 로고
    • Securedtrust: A dynamic trust computation model for secured communication in multiagent systems
    • Mar/Ar
    • A. Das and M.M. Islam, SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems, IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 261-274, Mar./Apr. 2012.
    • (2012) IEEE Trans. Dependable and Secure Computing , vol.9 , Issue.2 , pp. 261-274
    • Das, A.1    Islam, M.M.2
  • 22
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad Hoc Networks, vol. 1, no. 2/3, pp. 293-315, 2003. (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 24
    • 79960871268 scopus 로고    scopus 로고
    • Keep your friends close: Incorporating trust into social network-based sybil defenses
    • A. Mohaisen, N. Hopper, and Y. Kim, Keep Your Friends Close: Incorporating Trust into Social Network-Based Sybil Defenses, Proc. IEEE INFOCOM, pp. 1943-1951, 2011.
    • (2011) Proc. IEEE INFOCOM , pp. 1943-1951
    • Mohaisen, A.1    Hopper, N.2    Kim, Y.3
  • 25
    • 84861603155 scopus 로고    scopus 로고
    • Sybildefender: Defend against sybil attacks in large social networks
    • W. Wei, F. Xu, C.C. Tan, and Q. Li, Sybildefender: Defend Against Sybil Attacks in Large Social Networks, Proc. IEEE INFOCOM, pp. 1951-1959, 2012.
    • (2012) Proc. IEEE INFOCOM , pp. 1951-1959
    • Wei, W.1    Xu, F.2    Tan, C.C.3    Li, Q.4
  • 26
    • 78249265471 scopus 로고    scopus 로고
    • Social Group
    • Social Group,Wikipedia, http://en.wikipedia.org/wiki/Social-group, 2013.
    • (2013) Wikipedia
  • 27
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M.K. Franklin, Identity-Based Encryption from the Weil Pairing, Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 28
    • 84927727752 scopus 로고    scopus 로고
    • Security proofs for signature schemes
    • D. Pointcheval and J. Stern, Security Proofs for Signature Schemes, Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 387-398, 1996. (Pubitemid 126071081)
    • (1996) Lecture Notes in Computer Science , Issue.1070 , pp. 387-398
    • Pointcheval, D.1    Stern, J.2
  • 29
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters, Efficient Identity-Based Encryption without random Oracles, Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 114-127, 2005. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.