Page 100 - Trust in ICT 2017
P. 100
1 Trust in ICT
[92] S. R. a. M. M. Sheikh Mahbub Habib, “owards a trust management system for cloud computing,” p.
933–939, 2011.
[93] J. B. J. a. G.-J. A. Hassan Takabi, “Security and privacy challenges in cloud computing environments,”
IEEE Security & Privacy, pp. 24–31, 2010. .
[94] Kai Hwang and Deyi Li, “Trusted cloud computing with secure resources and data coloring,” Internet
Computing, IEEE, p. 14–22, 2010.
[95] K. K. a. Q. Malluhi, “Establishing Trust in Cloud Computing,” IT Professional, p. 20–27, 2010.
[96] A. F. R. G. A. D. J. R. K. A. K. G. Michael Armbrust, “A view of cloud computing,” Communications of
the ACM, pp. 50–58, 2010.
[97] S. P. a. A. Benameur, “Privacy, security and trust issues arising from cloud computing,” p. 693–702,
2010.
[98] P. J. M. M. S. P. M. K. Q. L. S. L. Ryan KL Ko, “TrustCloud: A framework for accountability and trust in
cloud computing,” pp. 584–588,, 2011. .
[99] A. Dumbrow, “Secure by design: a healthcare IT imperative,” 29 October 2015. [Online]. Available:
https://blogs.vmware.com/healthcare.
[100]] P. Giorgini, F. Massacci, J. Mylopoulos and N. Zannone, “Requirements engineering for trust
management: model, methodology, and reasoning,” 16 August 2006.
[101] J. Brill, “The Internet of Things: Building Trust and Maximizing Benefits Through Consumer Control,”
Fordham Law Review, vol. 83, no. 1, 2014.
[102] Y. G. D. Artz, ““A survey of trust in computer science and the semantic web,” in Web Semantics:
Science, Services and Agents on the World Wide Web, 2007.
[103] “[uTRUSTit-2012] Trust Definition White Paper - “Defining, Understanding, Explaining TRUST within
the uTRUSTit Project”,” 2012.
[104]] Siemens, Improving Performance with Integrated Smart Buildings www.usa.siemens.com [Accessed
on 25/Nov/2015].
[105] IBM, Building a worldwide smart connected enterprise
https://developer.ibm.com/iotfoundation/blog/recipe-page/sogeti-high-tech/[Accessed on
25/Nov/2015].
[106] IBM. ADEPT Practictioner Perspective - Pre Publication Draft - 7 Jan 2015.
[107] Leigh Ann Gilson. (2015). Internet of Things Lacks Safety Today, Opening Door to Major Threats
Tomorrow, Warns OTA. Online Trust Alliance. Retrieved from https://otalliance.org/news-
events/press-releases/internet-things-lacks-safety-today-opening-door-major-threats-tomorrow
[108] OTA. (2015, August 11). IoT Trust Framework – Discussion Draft. Retrieved from
https://otalliance.org/system/files/files/initiative/documents/iot_trust_frameworkv1_2.pdf
[109] OTA. (2015, 10 28). OTA IoT Trust Framework – Pre-Release Draft. Retrieved from
https://otalliance.org/system/files/files/initiative/documents/iot_trust_framework_lastcall.pdf
[110] TCG Published. (2013, October). Architect’s Guide: Cybersecurity. TCG Published. Retrieved from
http://www.trustedcomputinggroup.org/files/resource_files/CA36D107-1A4B-B294-
D08829372D5796E1/Architects Guide Cybersecurity.pdf
92