Author:
Mishra Shakti,Kushwaha D. S.,Misra A. K.
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Sun, Y., Han, Z., Ray Liu, K.J.: Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine, Feature Topic on Security in Mobile Ad Hoc and Sensor Networks 46(2), 112–119 (2008)
2. Chapin, P.C., Christian, S., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Computing Surveys 40(3) (2008)
3. Yu, Z.: Decentralized Trust Management based on the Reputation of Information Sources. In: The Proceedings of 2007 IEEE International Conference on Networking, Sensing and Control, London (2007)
4. Sun, Y.L., et al.: A Trust Evaluation framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. In: The Proceedings of 25th IEEE International Conference on Computer Communication: INFOCOM (2006)
5. Wu, Y., et al.: Automatically Constructing Trusted Cluster Computing Environment. The Journal of Supercomputing (July 2009)