메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 1178-1187

Hierarchical Trust Level Evaluation for Pervasive Social Networking

Author keywords

hierarchical trust level (HTL); Pervasive social networking (PSN); secure communication; trust evaluation

Indexed keywords

SECURE COMMUNICATION; TREES (MATHEMATICS);

EID: 85018470137     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2652486     Document Type: Article
Times cited : (15)

References (40)
  • 1
    • 84893539927 scopus 로고    scopus 로고
    • Secure pervasive social networking based on multi-dimensional trust levels
    • Oct.
    • Z. Yan, M. Wang, V. Niemi, and R. Kantola, "Secure pervasive social networking based on multi-dimensional trust levels, " in Proc. IEEE CNS, Oct. 2013, pp. 100-108.
    • (2013) Proc. IEEE CNS , pp. 100-108
    • Yan, Z.1    Wang, M.2    Niemi, V.3    Kantola, R.4
  • 2
    • 84963972157 scopus 로고    scopus 로고
    • Stochastic Petri net-based performance evaluation of hybrid Traffic for social networks system
    • Sep.
    • L. Li, W. Zeng, Z. Hong, and L. Zhou, "Stochastic Petri net-based performance evaluation of hybrid Traffic for social networks system, " Neurocom-puting, vol. 204, pp. 3-7, Sep. 2016.
    • (2016) Neurocom-puting , vol.204 , pp. 3-7
    • Li, L.1    Zeng, W.2    Hong, Z.3    Zhou, L.4
  • 3
    • 84944678235 scopus 로고    scopus 로고
    • An adaptive sensor data segments selection method for wearable health care services
    • S.-Y. Chen, C.-F. Lai, R.-H. Hwang, Y.-H. Lai, and M.-S. Wang, "An adaptive sensor data segments selection method for wearable health care services, " J. Med. Syst., vol. 39, no. 12, pp. 1-11, 2015.
    • (2015) J. Med. Syst. , vol.39 , Issue.12 , pp. 1-11
    • Chen, S.-Y.1    Lai, C.-F.2    Hwang, R.-H.3    Lai, Y.-H.4    Wang, M.-S.5
  • 4
    • 84954436216 scopus 로고    scopus 로고
    • Aprivacy preserving threefactor authentication protocol for e-health clouds
    • Oct.
    • Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He, "Aprivacy preserving threefactor authentication protocol for e-health clouds, " J. Supercomputing, vol. 72, no. 10, pp. 3826-3849, Oct. 2016.
    • (2016) J. Supercomputing , vol.72 , Issue.10 , pp. 3826-3849
    • Jiang, Q.1    Khan, M.K.2    Lu, X.3    Ma, J.4    He, D.5
  • 5
    • 84976428104 scopus 로고    scopus 로고
    • Securing SIFT: Privacypreserving outsourcing computation of feature extractions over encrypted image data
    • Jul.
    • S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing SIFT: Privacypreserving outsourcing computation of feature extractions over encrypted image data, " IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, Jul. 2016.
    • (2016) IEEE Trans. Image Process. , vol.25 , Issue.7 , pp. 3411-3425
    • Hu, S.1    Wang, Q.2    Wang, J.3    Qin, Z.4    Ren, K.5
  • 6
    • 84919877646 scopus 로고    scopus 로고
    • PerContRep: A practical reputation system for pervasive content services
    • Dec.
    • Z. Yan, Y. Chen, and Y. Shen, "PerContRep: A practical reputation system for pervasive content services, " J. Supercomput., vol. 70, no. 3, pp. 1051-1074, Dec. 2014.
    • (2014) J. Supercomput. , vol.70 , Issue.3 , pp. 1051-1074
    • Yan, Z.1    Chen, Y.2    Shen, Y.3
  • 7
    • 78651281054 scopus 로고    scopus 로고
    • Enabling social networking in ad hoc networks of mobile phones
    • Aug.
    • E. Sarigöl, O. Riva, P. Stuedi, and G. Alonso, "Enabling social networking in ad hoc networks of mobile phones, " Proc. VLDB Endowment, vol. 2, no. 2, pp. 1634-1637, Aug. 2009.
    • (2009) Proc. VLDB Endowment , vol.2 , Issue.2 , pp. 1634-1637
    • Sarigöl, E.1    Riva, O.2    Stuedi, P.3    Alonso, G.4
  • 9
    • 0031743760 scopus 로고    scopus 로고
    • The evolution of trust and cooperation between strangers: A computational model
    • Oct.
    • M. W. Macy and J. Skvoretz, "The evolution of trust and cooperation between strangers: A computational model, " Amer. Sociol. Rev., vol. 63, no. 5, pp. 638-660, Oct. 1998.
    • (1998) Amer. Sociol. Rev. , vol.63 , Issue.5 , pp. 638-660
    • Macy, M.W.1    Skvoretz, J.2
  • 10
    • 84875211673 scopus 로고    scopus 로고
    • A practical reputation system for pervasive social chatting
    • Aug.
    • Z. Yan, Y. Chen, and Y. Shen, "A practical reputation system for pervasive social chatting, " J. Comput. Syst. Sci., vol. 79, no. 5, pp. 556-572, Aug. 2013.
    • (2013) J. Comput. Syst. Sci. , vol.79 , Issue.5 , pp. 556-572
    • Yan, Z.1    Chen, Y.2    Shen, Y.3
  • 11
    • 85018509351 scopus 로고    scopus 로고
    • Protect pervasive social networking based on twodimensional trust levels
    • to be published
    • Z. Yan and M. Wang, "Protect pervasive social networking based on twodimensional trust levels, " IEEE Syst. J., to be published.
    • IEEE Syst. J.
    • Yan, Z.1    Wang, M.2
  • 14
    • 84922323888 scopus 로고    scopus 로고
    • A novel routing protocol providing good transmission reliability in underwater sensor networks
    • J. Shen, H. Tan, J. Wang, J. Wang, and S. Lee, "A novel routing protocol providing good transmission reliability in underwater sensor networks, " J. Internet Technol., vol. 16, no. 1, pp. 171-178, 2015.
    • (2015) J. Internet Technol. , vol.16 , Issue.1 , pp. 171-178
    • Shen, J.1    Tan, H.2    Wang, J.3    Wang, J.4    Lee, S.5
  • 15
    • 70849109966 scopus 로고    scopus 로고
    • Solutions to security and privacy issues in mobile social networking
    • Aug.
    • A. Beach, M. Gartrell, and R. Han, "Solutions to security and privacy issues in mobile social networking, " in Proc. Int. Conf. Comput. Sci. Eng., Aug. 2009, pp. 1036-1042.
    • (2009) Proc. Int. Conf. Comput. Sci. Eng. , pp. 1036-1042
    • Beach, A.1    Gartrell, M.2    Han, R.3
  • 16
    • 67650293214 scopus 로고    scopus 로고
    • Understanding and capturing people's privacy policies in a mobile social networking application
    • Aug.
    • N. Sadeh et al., "Understanding and capturing people's privacy policies in a mobile social networking application, " Pers. Ubiquitous Comput., vol. 13, no. 6, pp. 401-412, Aug. 2009.
    • (2009) Pers. Ubiquitous Comput. , vol.13 , Issue.6 , pp. 401-412
    • Sadeh, N.1
  • 17
    • 84866497422 scopus 로고    scopus 로고
    • Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application
    • Nov.
    • E. Miluzzo et al., "Sensing meets mobile social networks: The design, implementation and evaluation of the cenceme application, " in Proc. ACM Conf. Embedded Netw. Sensor Syst., Nov. 2008, pp. 337-350.
    • (2008) Proc. ACM Conf. Embedded Netw. Sensor Syst. , pp. 337-350
    • Miluzzo, E.1
  • 18
    • 84973560504 scopus 로고    scopus 로고
    • An efficient RFID authentication protocol providing strong privacy and security
    • J. Shen, H. Tan, S. Moh, I. Chung, and J. Wang, "An efficient RFID authentication protocol providing strong privacy and security, " J. Internet Technol., vol. 17, no. 3, p. 2, 2016.
    • (2016) J. Internet Technol. , vol.17 , Issue.3 , pp. 2
    • Shen, J.1    Tan, H.2    Moh, S.3    Chung, I.4    Wang, J.5
  • 19
    • 84923405290 scopus 로고    scopus 로고
    • A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
    • Oct.
    • X. Li, J. Niu, S. Kumari, J. Liao, W. Liang, and M. K. Khan, "A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity, " Secur. Commun. Netw., vol. 9, no. 15, pp. 2643-2655, Oct. 2015.
    • (2015) Secur. Commun. Netw. , vol.9 , Issue.15 , pp. 2643-2655
    • Li, X.1    Niu, J.2    Kumari, S.3    Liao, J.4    Liang, W.5    Khan, M.K.6
  • 20
    • 84963715652 scopus 로고    scopus 로고
    • A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security
    • Jul.
    • X. Li et al., "A novel chaotic maps-based user authentication and key agreement protocol for multi-server environments with provable security, " Wireless Pers. Commun., vol. 89, no. 2, pp. 569-597, Jul. 2016.
    • (2016) Wireless Pers. Commun. , vol.89 , Issue.2 , pp. 569-597
    • Li, X.1
  • 21
    • 85008263167 scopus 로고    scopus 로고
    • An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks
    • Dec.
    • Q. Jiang, J. Ma, F. Wei, Y. Tian, J. Shen, and Y. Yang, "An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks, " J. Netw. Comput. Appl., vol. 76, pp. 37-48, Dec. 2016.
    • (2016) J. Netw. Comput. Appl. , vol.76 , pp. 37-48
    • Jiang, Q.1    Ma, J.2    Wei, F.3    Tian, Y.4    Shen, J.5    Yang, Y.6
  • 22
    • 84971667845 scopus 로고    scopus 로고
    • An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems
    • Jun.
    • X. Li, K. Wang, J. Shen, S. Kumari, F. Wu, and Y. Hu, "An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems, " J. Ambient Intell. Humanized Comput., vol. 7, no. 3, pp. 427-443, Jun. 2016.
    • (2016) J. Ambient Intell. Humanized Comput. , vol.7 , Issue.3 , pp. 427-443
    • Li, X.1    Wang, K.2    Shen, J.3    Kumari, S.4    Wu, F.5    Hu, Y.6
  • 23
    • 84958124876 scopus 로고    scopus 로고
    • Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
    • Mar.
    • Q. Jiang, F. Wei, S. Fu, J. Ma, G. Li, and A. Alelaiwi, "Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy, " Nonlinear Dyn., vol. 83, no. 4, pp. 2085-2101, Mar. 2016.
    • (2016) Nonlinear Dyn. , vol.83 , Issue.4 , pp. 2085-2101
    • Jiang, Q.1    Wei, F.2    Fu, S.3    Ma, J.4    Li, G.5    Alelaiwi, A.6
  • 24
    • 84963682665 scopus 로고    scopus 로고
    • One-to-many authentication for access control in mobile pay-TV systems
    • D. He, N. Kumar, H. Shen, and J. Lee, "One-to-many authentication for access control in mobile pay-TV systems, " Sci. China Inf. Sci., vol. 59, no. 5, pp. 1-14, 2016, doi: 10. 1007/s11432-015-5469-5.
    • (2016) Sci. China Inf. Sci. , vol.59 , Issue.5 , pp. 1-14
    • He, D.1    Kumar, N.2    Shen, H.3    Lee, J.4
  • 29
    • 84890369044 scopus 로고    scopus 로고
    • An efficient verifiably encrypted signature from weil pairing an efficient verifiably encrypted signature from weil pairing
    • J. Shen, W. Zheng, J. Wang, Y. Zheng, X. Sun, and S. Lee, "An efficient verifiably encrypted signature from weil pairing an efficient verifiably encrypted signature from weil pairing, " J. Internet Technol., vol. 14, no. 6, pp. 947-952, 2013.
    • (2013) J. Internet Technol. , vol.14 , Issue.6 , pp. 947-952
    • Shen, J.1    Zheng, W.2    Wang, J.3    Zheng, Y.4    Sun, X.5    Lee, S.6
  • 30
    • 84984791521 scopus 로고    scopus 로고
    • A provably secure Certificate-based encryption scheme against malicious CA attacks in the standard model
    • Dec.
    • Y. Lu and J. Li, "A provably secure Certificate-based encryption scheme against malicious CA attacks in the standard model, " Inf. Sci., vol. 372, pp. 745-757, Dec. 2016.
    • (2016) Inf. Sci. , vol.372 , pp. 745-757
    • Lu, Y.1    Li, J.2
  • 31
    • 85018467045 scopus 로고    scopus 로고
    • A secure identity-based dynamic group data sharing scheme for cloud computing
    • J. Shen, D.-Z. Liu, C.-F. Lai, Y.-J. Ren, and X.-M. Sun, "A secure identity-based dynamic group data sharing scheme for cloud computing, " J. Internet Technol., vol. 99, no. 99, pp. 1-9, 2015.
    • (2015) J. Internet Technol. , vol.99 , Issue.99 , pp. 1-9
    • Shen, J.1    Liu, D.-Z.2    Lai, C.-F.3    Ren, Y.-J.4    Sun, X.-M.5
  • 32
    • 84893719831 scopus 로고    scopus 로고
    • Identitybased chameleon hashing and signatures without key exposure
    • May
    • X. Chen, F. Zhang, W. Susilo, H. Tian, J. Li, and K. Kim, "Identitybased chameleon hashing and signatures without key exposure, " Inf. Sci., vol. 265, no. 5, pp. 198-210, May 2014.
    • (2014) Inf. Sci. , vol.265 , Issue.5 , pp. 198-210
    • Chen, X.1    Zhang, F.2    Susilo, W.3    Tian, H.4    Li, J.5    Kim, K.6
  • 33
    • 33646516197 scopus 로고    scopus 로고
    • The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design
    • Aug.
    • O. Lee, S. Yoo, B. Park, and I. Chung, "The design and analysis of an efficient load balancing algorithm employing the symmetric balanced incomplete block design, " Inf. Sci., vol. 176, no. 15, pp. 2148-2160, Aug. 2006.
    • (2006) Inf. Sci. , vol.176 , Issue.15 , pp. 2148-2160
    • Lee, O.1    Yoo, S.2    Park, B.3    Chung, I.4
  • 34
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems, " Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 35
    • 84872875967 scopus 로고    scopus 로고
    • Identity-based key agreement protocol employing a symmetric balanced incomplete block design
    • Dec.
    • J. Shen, S. Moh, and I. Chung, "Identity-based key agreement protocol employing a symmetric balanced incomplete block design, " J. Commun. Netw., vol. 14, no. 6, pp. 682-691, Dec. 2012.
    • (2012) J. Commun. Netw. , vol.14 , Issue.6 , pp. 682-691
    • Shen, J.1    Moh, S.2    Chung, I.3
  • 36
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing, " SIAM J. Comput., vol. 32, no. 3, pp. 213-229, 2003.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 39
    • 0033748607 scopus 로고    scopus 로고
    • New multiparty authentication services and key agreement protocols
    • Apr.
    • G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols, " IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 628-639, Apr. 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.4 , pp. 628-639
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 40
    • 84928106743 scopus 로고    scopus 로고
    • Mutual verifiable provable data auditing in public cloud storage
    • Y. Ren, J. Shen, J. Wang, J. Han, and S. Lee, "Mutual verifiable provable data auditing in public cloud storage, " J. Internet Technol., vol. 16, no. 2, pp. 317-323, 2015.
    • (2015) J. Internet Technol. , vol.16 , Issue.2 , pp. 317-323
    • Ren, Y.1    Shen, J.2    Wang, J.3    Han, J.4    Lee, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.