-
1
-
-
85013816684
-
-
Gartner newsroom
-
[1] Gartner newsroom, ( http://www.gartner.com/newsroom/id/2828722).
-
-
-
-
3
-
-
85013820339
-
-
The Gartner report, 2013
-
[3] The Gartner report, 2013, ( http://www.gartner.com/imagesrv/pdf/Gartner_2013_annual_report.pdf).
-
-
-
-
4
-
-
84866034380
-
The social internet of things (siot) – when social networks meet the internet of things: concept, architecture and network characterization
-
[4] Atzori, L., Iera, A., Morabito, G., Nitti, M., The social internet of things (siot) – when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56 (2012), 3594–3608.
-
(2012)
Comput. Netw.
, vol.56
, pp. 3594-3608
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
Nitti, M.4
-
5
-
-
84867693994
-
Dynamic trust management for internet of things applications
-
ACM
-
[5] Bao, F., Chen, I.-R., Dynamic trust management for internet of things applications. International Workshop on Self-aware Internet of Things, 2012, ACM, 1–6.
-
(2012)
International Workshop on Self-aware Internet of Things
, pp. 1-6
-
-
Bao, F.1
Chen, I.-R.2
-
6
-
-
84866382206
-
Trust management for the internet of things and its application to service composition
-
IEEE
-
[6] Bao, F., Chen, I.-R., Trust management for the internet of things and its application to service composition. IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012, IEEE, 1–6.
-
(2012)
IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM)
, pp. 1-6
-
-
Bao, F.1
Chen, I.-R.2
-
7
-
-
85008066028
-
Models@ run.time
-
[7] Blair, G., Bencomo, N., France, R.B., Models@ run.time. Computer 42:10 (2009), 22–27, 10.1109/MC.2009.326.
-
(2009)
Computer
, vol.42
, Issue.10
, pp. 22-27
-
-
Blair, G.1
Bencomo, N.2
France, R.B.3
-
8
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press
-
[8] Blaze, M., Feigenbaum, J., Lacy, J., Decentralized trust management. Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996, IEEE Computer Society Press, 164–173.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
84866346403
-
Trm-iot: a trust management model based on fuzzy reputation for internet of things
-
[9] Chen, D., Chang, G., Sun, D., Li, J., Jia, J., Wang, X., Trm-iot: a trust management model based on fuzzy reputation for internet of things. Comput. Sci. Inf. Syst. 8:4 (2011), 1207–1228.
-
(2011)
Comput. Sci. Inf. Syst.
, vol.8
, Issue.4
, pp. 1207-1228
-
-
Chen, D.1
Chang, G.2
Sun, D.3
Li, J.4
Jia, J.5
Wang, X.6
-
10
-
-
84864044924
-
A dynamic component model for cyber physical systems
-
[10] Fouquet, F., Barais, O., Plouzeau, N., Jézéquel, J.-M., Morin, B., Fleurey, F., A dynamic component model for cyber physical systems. 15th International ACM SIGSOFT Symposium on Component Based Software Engineering, Bertinoro, Italy, 2012.
-
(2012)
15th International ACM SIGSOFT Symposium on Component Based Software Engineering, Bertinoro, Italy
-
-
Fouquet, F.1
Barais, O.2
Plouzeau, N.3
Jézéquel, J.-M.4
Morin, B.5
Fleurey, F.6
-
11
-
-
84865133602
-
Dependability-driven runtime management of service oriented architectures
-
[11] Hanen, H., Bourcier, J., Dependability-driven runtime management of service oriented architectures. PESOS - 4th International Workshop on Principles of Engineering Service-Oriented Systems - 2012, Zurich, Switzerland, 2012.
-
(2012)
PESOS - 4th International Workshop on Principles of Engineering Service-Oriented Systems - 2012, Zurich, Switzerland
-
-
Hanen, H.1
Bourcier, J.2
-
12
-
-
0034872904
-
Trust-adapted enforcement of security policies in distributed component-structured applications
-
[12] Herrmann, P., Krumm, H., Trust-adapted enforcement of security policies in distributed component-structured applications. Sixth IEEE Symposium on Computers and Communications, 2001, 2–8.
-
(2001)
Sixth IEEE Symposium on Computers and Communications
, pp. 2-8
-
-
Herrmann, P.1
Krumm, H.2
-
13
-
-
79953160072
-
An architecture for trust-adaptive agents
-
IEEE
-
[13] Klejnowski, L., Bernard, Y., Hähner, J., Müller-Schloer, C., An architecture for trust-adaptive agents. 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), 2010, IEEE, 178–183.
-
(2010)
2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO)
, pp. 178-183
-
-
Klejnowski, L.1
Bernard, Y.2
Hähner, J.3
Müller-Schloer, C.4
-
14
-
-
79957455283
-
Privacy-aware access control with trust management in web service
-
[14] Li, M., Sun, X., Wang, H., Zhang, Y., Zhang, J., Privacy-aware access control with trust management in web service. World Wide Web 14:4 (2011), 407–430, 10.1007/s11280-011-0114-8.
-
(2011)
World Wide Web
, vol.14
, Issue.4
, pp. 407-430
-
-
Li, M.1
Sun, X.2
Wang, H.3
Zhang, Y.4
Zhang, J.5
-
17
-
-
84866037455
-
A conceptual framework for trust models
-
S. Fischer-Hübner S. Katsikas G. Quirchmayr
-
[17] Moyano, F., Fernandez-Gago, C., Lopez, J., A conceptual framework for trust models. Fischer-Hübner, S., Katsikas, S., Quirchmayr, G., (eds.) 9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012) Lectures Notes in Computer Science. Springer Verlag, Springer Verlag, Vienna, 7449, 2012, 93–104, 10.1007/978-3-642-32287-7.
-
(2012)
9th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2012), Lectures Notes in Computer Science. Springer Verlag, Springer Verlag, Vienna
, vol.7449
, pp. 93-104
-
-
Moyano, F.1
Fernandez-Gago, C.2
Lopez, J.3
-
18
-
-
84893107821
-
Building trust and reputation in: a development framework for trust models implementation
-
A. Jøsang P. Samarati M. Petrocchi
-
[18] Moyano, F., Fernandez-Gago, C., Lopez, J., Building trust and reputation in: a development framework for trust models implementation. Jøsang, A., Samarati, P., Petrocchi, M., (eds.) 8th International Workshop on Security and Trust Management (STM 2012) LNCS. Springer, Springer, Pisa, 7783, 2013, 113–128, 10.1007/978-3-642-38004-4.
-
(2013)
8th International Workshop on Security and Trust Management (STM 2012), LNCS. Springer, Springer, Pisa
, vol.7783
, pp. 113-128
-
-
Moyano, F.1
Fernandez-Gago, C.2
Lopez, J.3
-
19
-
-
84886600253
-
A framework for enabling trust requirements in social cloud applications
-
[19] Moyano, F., Fernandez-Gago, C., Lopez, J., A framework for enabling trust requirements in social cloud applications. Requirements Eng. 18 (2013), 321–341, 10.1007/s00766-013-0171-x.
-
(2013)
Requirements Eng.
, vol.18
, pp. 321-341
-
-
Moyano, F.1
Fernandez-Gago, C.2
Lopez, J.3
-
20
-
-
84879876486
-
Towards engineering trust-aware future internet systems
-
X. Franch P. Soffer Springer-Verlag Valencia, Spain
-
[20] Moyano, F., Fernandez-Gago, C., Lopez, J., Towards engineering trust-aware future internet systems. Franch, X., Soffer, P., (eds.) 3rd International Workshop on Information Systems Security Engineering (WISSE 2013) LNBIP, 2013, Springer-Verlag, Valencia, Spain, 490–501.
-
(2013)
3rd International Workshop on Information Systems Security Engineering (WISSE 2013), LNBIP
, pp. 490-501
-
-
Moyano, F.1
Fernandez-Gago, C.2
Lopez, J.3
-
21
-
-
85013745013
-
A model-driven approach for engineering trust and reputation into software services
-
[21] Moyano, F., Fernandez-Gago, C., Lopez, J., A model-driven approach for engineering trust and reputation into software services. J. Netw. Comput. Appl. 69 (2016), 134–151.
-
(2016)
J. Netw. Comput. Appl.
, vol.69
, pp. 134-151
-
-
Moyano, F.1
Fernandez-Gago, C.2
Lopez, J.3
-
22
-
-
84892384466
-
Detecting insider threats: a trust-aware framework
-
IEEE
-
[22] Paci, F., Fernandez-Gago, C., Moyano, F., Detecting insider threats: a trust-aware framework. IEEE, (eds.) 8th International Conference on Availability, Reliability and Security (ARES), 2013, 121–130.
-
(2013)
8th International Conference on Availability, Reliability and Security (ARES)
, pp. 121-130
-
-
Paci, F.1
Fernandez-Gago, C.2
Moyano, F.3
-
23
-
-
79952065681
-
Runtime behavior monitoring and self-adaptation in service-oriented systems
-
[23] Psaier, H., Juszczyk, L., Skopik, F., Schall, D., Dustdar, S., Runtime behavior monitoring and self-adaptation in service-oriented systems. 2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems (SASO), 0, 2013, 164–173, 10.1109/SASO.2010.44.
-
(2013)
2013 IEEE 7th International Conference on Self-Adaptive and Self-Organizing Systems (SASO)
, pp. 164-173
-
-
Psaier, H.1
Juszczyk, L.2
Skopik, F.3
Schall, D.4
Dustdar, S.5
-
24
-
-
84959335910
-
When things matter: a survey on data-centric internet of things
-
[24] Qin, Y., Sheng, Q.Z., Falkner, N.J., Dustdar, S., Wang, H., Vasilakos, A.V., When things matter: a survey on data-centric internet of things. J. Netw. Comput. Appl. 64 (2016), 137–153, 10.1016/j.jnca.2015.12.016.
-
(2016)
J. Netw. Comput. Appl.
, vol.64
, pp. 137-153
-
-
Qin, Y.1
Sheng, Q.Z.2
Falkner, N.J.3
Dustdar, S.4
Wang, H.5
Vasilakos, A.V.6
-
25
-
-
84888861197
-
Trust management system design for the internet of things: a context-aware and multi-service approach
-
[25] Saied, Y.B., Olivereau, A., Zeghlache., D., Trust management system design for the internet of things: a context-aware and multi-service approach. Comput. Secur. 39 (2013), 351–365.
-
(2013)
Comput. Secur.
, vol.39
, pp. 351-365
-
-
Saied, Y.B.1
Olivereau, A.2
Zeghlache, D.3
-
26
-
-
81255190761
-
Combining trust and self-organization for robust maintaining of information coherence in disturbed mas
-
IEEE
-
[26] Vu, Q., Hassas, S., Armetta, F., Gaudou, B., Canal, R., Combining trust and self-organization for robust maintaining of information coherence in disturbed mas. Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO), 2011, IEEE, 178–187.
-
(2011)
Fifth IEEE International Conference on Self-Adaptive and Self-Organizing Systems (SASO)
, pp. 178-187
-
-
Vu, Q.1
Hassas, S.2
Armetta, F.3
Gaudou, B.4
Canal, R.5
-
27
-
-
80052880154
-
Autonomic trust management for a component-based software system
-
[27] Yan, Z., Prehofer, C., Autonomic trust management for a component-based software system. Dependable Secure Comput. IEEE Trans. 8:6 (2011), 810–823.
-
(2011)
Dependable Secure Comput. IEEE Trans.
, vol.8
, Issue.6
, pp. 810-823
-
-
Yan, Z.1
Prehofer, C.2
|