Trust Integration for Security Optimisation in P2P-Based M2M Applications.
Besfort ShalaPatrick WachtUlrich TrickArmin LehmannBogdan V. GhitaStavros ShiaelesPublished in: TrustCom/BigDataSE/ICESS (2017)
Keyphrases
- trust management
- trust relationships
- policy enforcement
- access control
- trust model
- trust evaluation
- management system
- enterprise network
- trust negotiation
- trusted computing
- security management
- virtual communities
- computer security
- intrusion detection
- resource discovery
- security issues
- data security
- peer to peer
- public key infrastructure
- information security
- privacy concerns
- virtual organization
- security policies
- data integration
- reputation management
- security requirements
- internet banking
- security services
- genetic algorithm
- network security
- computing environments
- service providers
- anomaly detection
- web services