Towards Verifiable Trust Management for Software Execution

Author(s):  
Michael Huth ◽  
Jim Huan-Pu Kuo
2009 ◽  
Vol 4 (2) ◽  
pp. 2-8 ◽  
Author(s):  
Wiesław Maria Grudzewski ◽  
Irena Krystyna Hejduk ◽  
Anna Sankowska

2005 ◽  
Author(s):  
Lalana Kagal ◽  
Jeffrey Undercoffer ◽  
Filip Perich ◽  
Anupam Joshi ◽  
Tim Finin

2010 ◽  
Vol 29 (2) ◽  
pp. 278-290 ◽  
Author(s):  
Gabriel López Millán ◽  
Manuel Gil Pérez ◽  
Gregorio Martínez Pérez ◽  
Antonio F. Gómez Skarmeta
Keyword(s):  

2020 ◽  
Vol 2020 ◽  
pp. 1-9 ◽  
Author(s):  
S. Tephillah ◽  
J. Martin Leo Manickam

Security is a pending challenge in cooperative spectrum sensing (CSS) as it employs a common channel and a controller. Spectrum sensing data falsification (SSDF) attacks are challenging as different types of attackers use them. To address this issue, the sifting and evaluation trust management algorithm (SETM) is proposed. The necessity of computing the trust for all the secondary users (SUs) is eliminated based on the use of the first phase of the algorithm. The second phase is executed to differentiate the random attacker and the genuine SUs. This reduces the computation and overhead costs. Simulations and complexity analyses have been performed to prove the efficiency and appropriateness of the proposed algorithm for combating SSDF attacks.


2021 ◽  
pp. 127407
Author(s):  
Yuhan Bai ◽  
Kai Fan ◽  
Kuan Zhang ◽  
Xiaochun Cheng ◽  
Hui Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document