메뉴 건너뛰기




Volumn 33, Issue 4, 2017, Pages 1007-1023

An attribute-based trust negotiation protocol for D2D communication in smart city balancing trust and privacy

Author keywords

Attribute based; D2D communication; Smart city; Tradeoff between trust and privacy; Trust negotiation

Indexed keywords

COMBINATORIAL OPTIMIZATION; CRYPTOGRAPHY; INFORMATION MANAGEMENT; SECURITY OF DATA; URBAN GROWTH;

EID: 85049899506     PISSN: 10162364     EISSN: None     Source Type: Journal    
DOI: 10.6688/JISE.2017.33.4.10     Document Type: Article
Times cited : (24)

References (31)
  • 1
    • 1942487780 scopus 로고    scopus 로고
    • A new authentication scheme with anonymity for wireless environments
    • J. Zhu and J. Ma, “A new authentication scheme with anonymity for wireless environments,” IEEE Transactions on Consumer Electronics, Vol. 50, 2004, pp. 231-235.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , pp. 231-235
    • Zhu, J.1    Ma, J.2
  • 2
    • 84916883747 scopus 로고    scopus 로고
    • A variable threshold-value authentication architecture for wireless mesh networks
    • P. Guo, J. Wang, B. Li, and S. Lee, “A variable threshold-value authentication architecture for wireless mesh networks,” Journal of Internet Technology, Vol. 15, 2014, pp. 929-936.
    • (2014) Journal of Internet Technology , vol.15 , pp. 929-936
    • Guo, P.1    Wang, J.2    Li, B.3    Lee, S.4
  • 4
    • 84921914402 scopus 로고    scopus 로고
    • ReputationPro: The efficient approaches to contextual transaction trust computation in E-commerce environments
    • H. B. Zhang, Y. Wang, X. Z. Zhang, and E.-P. Lim, “ReputationPro: the efficient approaches to contextual transaction trust computation in E-commerce environments,” ACM Transactions on the Web, Vol. 9, 2015, p. 49.
    • (2015) ACM Transactions on The Web , vol.9 , pp. 49
    • Zhang, H.B.1    Wang, Y.2    Zhang, X.Z.3    Lim, E.-P.4
  • 7
    • 84855998039 scopus 로고    scopus 로고
    • A trust negotiation based security framework for service provisioning in load-balancing clusters
    • A. Maña, H. Koshutanski, and E. J. Pérez, “A trust negotiation based security framework for service provisioning in load-balancing clusters,” Computers and Security, Vol. 31, 2012, pp. 4-25.
    • (2012) Computers and Security , vol.31 , pp. 4-25
    • Maña, A.1    Koshutanski, H.2    Pérez, E.J.3
  • 12
    • 84855998039 scopus 로고    scopus 로고
    • A trust negotiation based security framework for service provisioning in load-balancing clusters
    • A. Maña, H. Koshutanski, and E. J.Pérez, “A trust negotiation based security framework for service provisioning in load-balancing clusters,” Computers and Security, Vol. 31, 2012, pp. 4-25.
    • (2012) Computers and Security , vol.31 , pp. 4-25
    • Maña, A.1    Koshutanski, H.2    Pérez, E.J.3
  • 13
    • 80052669474 scopus 로고    scopus 로고
    • A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs)
    • H. Lin, L. Xu, J. Gao, et al., “A subjective logic based dynamic trust mechanism for voice over internet protocol (VOIP) over wireless mesh networks (WMNs),” Scientific Research and Essays, Vol. 18, 2011, pp. 3873-3884.
    • (2011) Scientific Research and Essays , vol.18 , pp. 3873-3884
    • Lin, H.1    Xu, L.2    Gao, J.3
  • 16
    • 35048864339 scopus 로고    scopus 로고
    • Trading privacy for trust
    • Springer, Berlin, Heidelberg
    • J. M. Seigneur and C. D. Jensen, “Trading privacy for trust,” Trust Management, Springer, Berlin, Heidelberg, 2004, pp. 93-107.
    • (2004) Trust Management , pp. 93-107
    • Seigneur, J.M.1    Jensen, C.D.2
  • 17
    • 84957811521 scopus 로고    scopus 로고
    • Protecting privacy during on-line trust negotiation
    • Springer, Berlin, Heidelberg
    • Seamons, E. Kent, et al., “Protecting privacy during on-line trust negotiation,” Privacy Enhancing Technologies, Springer, Berlin, Heidelberg, 2003, pp. 129-143.
    • (2003) Privacy Enhancing Technologies , pp. 129-143
    • Seamons, E.K.1
  • 18
    • 78349255568 scopus 로고    scopus 로고
    • Point-based trust: Define how much privacy is worth
    • Springer, Berlin, Heidelberg
    • D. Yao, K. B. Frikken, M. J. Atallah, et al., “Point-based trust: Define how much privacy is worth,” Information and Communications Security, Springer, Berlin, Heidelberg, 2006, pp. 190-209.
    • (2006) Information and Communications Security , pp. 190-209
    • Yao, D.1    Frikken, K.B.2    Atallah, M.J.3
  • 25
    • 85032613367 scopus 로고    scopus 로고
    • Cloud-based utility service framework for trust negotiations using federated identity management
    • U. Premarathne, I. Khalil, Z. Tari, et al., “Cloud-based utility service framework for trust negotiations using federated identity management,” IEEE Transactions on Cloud Computing, 2015.
    • (2015) IEEE Transactions on Cloud Computing
    • Premarathne, U.1    Khalil, I.2    Tari, Z.3
  • 29
    • 77649261628 scopus 로고    scopus 로고
    • Ph.D. Thesis, Department of Computer Science, Stanford University
    • C. Gentry, “A fully homomorphic encryption scheme,” Ph.D. Thesis, Department of Computer Science, Stanford University, 2009.
    • (2009) A Fully Homomorphic Encryption Scheme
    • Gentry, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.