Page 101 - Trust in ICT 2017
P. 101

Trust in ICT                                                1


             [111]  TCG Published. (2015, September 14). Guidance for Securing IoT Using TCG Technology. 1.1. TCG
                   Published. Retrieved from
                   https://www.trustedcomputinggroup.org/files/resource_files/CD35B517-1A4B-B294-
                   D0A08D30868AB3D1/TCG_Guidance_for_Securing_IoT_1_0r21.pdf

             [112]  Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R., “A fuzzy approach to trust based access control
                   in internet of things,” Wireless Communications, Vehicular Technology, Information Theory and
                   Aerospace & Electronic Systems (VITAE), 2013 3rd International Conference on, June 2013.
             [113]  oneM2M Technical Report, “oneM2M Use cases collection,” September 2013.

             [114]  Guy Zyskind, Oz Nathan, Alex ’Sandy’ Pentland, “Decentralizing Privacy: Using Blockchain to Protect
                   Personal Data,” Security and Privacy Workshops (SPW), 2015 IEEE, May 2015.

             [115]  Jin-Hee Cho, Ananthram Swami, “Towards trust-based cognitive networks: a survey of trust
                   management for mobile ad hoc networks,” 14th ICCRTS, May 2009.






























































                                                                                                           93
   96   97   98   99   100   101   102   103   104   105   106