Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in Multi-access Edge Computing.
Belal AliMark A. GregoryShuo LiOmar Amjad DibPublished in: Comput. Networks (2024)
Keyphrases
- trust aware
- factor authentication
- trust model
- trust relationships
- access control
- recommender systems
- security mechanisms
- trust management
- password authentication
- public key infrastructure
- security requirements
- security services
- identity authentication
- trust negotiation
- authentication protocol
- trusted computing
- security analysis
- data encryption
- authentication systems
- identity management
- security policies
- user authentication
- multiagent systems
- network access
- authentication mechanism
- security systems
- encryption decryption
- security issues
- fuzzy vault
- information security
- access control systems
- biometric authentication
- data security
- multi agent systems
- smart card
- authentication scheme
- data protection
- role based access control
- key distribution
- ad hoc networks
- collaborative filtering
- virtual private network