Page 101 - Trust in ICT 2017
P. 101
Trust in ICT 1
[111] TCG Published. (2015, September 14). Guidance for Securing IoT Using TCG Technology. 1.1. TCG
Published. Retrieved from
https://www.trustedcomputinggroup.org/files/resource_files/CD35B517-1A4B-B294-
D0A08D30868AB3D1/TCG_Guidance_for_Securing_IoT_1_0r21.pdf
[112] Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R., “A fuzzy approach to trust based access control
in internet of things,” Wireless Communications, Vehicular Technology, Information Theory and
Aerospace & Electronic Systems (VITAE), 2013 3rd International Conference on, June 2013.
[113] oneM2M Technical Report, “oneM2M Use cases collection,” September 2013.
[114] Guy Zyskind, Oz Nathan, Alex ’Sandy’ Pentland, “Decentralizing Privacy: Using Blockchain to Protect
Personal Data,” Security and Privacy Workshops (SPW), 2015 IEEE, May 2015.
[115] Jin-Hee Cho, Ananthram Swami, “Towards trust-based cognitive networks: a survey of trust
management for mobile ad hoc networks,” 14th ICCRTS, May 2009.
93