Today’s organizations rely on internal or cloud-infrastructures to manage their data and their products. Due to the increasing importance and complexity of these infrastructures, there is the need to implement a reliable way to monitor the trustworthiness of the devices that are part of it. It is important to establish trust within the nodes of a single or multiple security domains to enhance the security of an enterprise’s infrastructure. This thesis aims to develop and evaluate a method to measure and calculate a trust score for each node and security domain of a network infrastructure. This method will be based on a centralized verifier that collects and verifies all the security and performance-based evidence from the nodes that compos...
Trust models have recently been proposed for Internet of Things (IoT) applications as a significant ...
With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-p...
The paper addresses the problem of trust in large computer networks that connect several independent...
Telecommunications systems are critical systems with high quality of service constraints. In Network...
SDN and NFV are modern techniques to implement networking infrastructures and can be used also to im...
An important concept in network security is trust, interpreted as a relation among entities that par...
. Authentication in open networks usually requires participation of trusted entities. Many protocols...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
With the present need for on the move networking, innovative technologies strive to establish a tech...
In this paper we study and propose a trust model and trust metric composition models based on a trus...
The Internet of Things is enriching our life with an ecosystem of interconnected devices. Object coo...
Along with the many benefits of IoT, its heterogeneity brings a new challenge to establish a trustwo...
An important concept in network security is trust, interpreted as a relation among entities that par...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
Trust models have recently been proposed for Internet of Things (IoT) applications as a significant ...
With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-p...
The paper addresses the problem of trust in large computer networks that connect several independent...
Telecommunications systems are critical systems with high quality of service constraints. In Network...
SDN and NFV are modern techniques to implement networking infrastructures and can be used also to im...
An important concept in network security is trust, interpreted as a relation among entities that par...
. Authentication in open networks usually requires participation of trusted entities. Many protocols...
Within the realm of network security, we interpret the concept of trust as a relation among entities...
The performance of distributed networks depends on collaboration among distributed entities. To enha...
With the present need for on the move networking, innovative technologies strive to establish a tech...
In this paper we study and propose a trust model and trust metric composition models based on a trus...
The Internet of Things is enriching our life with an ecosystem of interconnected devices. Object coo...
Along with the many benefits of IoT, its heterogeneity brings a new challenge to establish a trustwo...
An important concept in network security is trust, interpreted as a relation among entities that par...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
Trust models have recently been proposed for Internet of Things (IoT) applications as a significant ...
With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-p...
The paper addresses the problem of trust in large computer networks that connect several independent...