2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) 2018
DOI: 10.1109/aina.2018.00165
|View full text |Cite
|
Sign up to set email alerts
|

Trust Assessment for Internet of Things in Multi-access Edge Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 25 publications
0
16
0
Order By: Relevance
“…Table1 summarises the capabilitybased access control mechanisms. There are other mechanisms such as TPM-based access control [47] that might be suitable for a particular MEC environment.…”
Section: ) Access Controlmentioning
confidence: 99%
See 3 more Smart Citations
“…Table1 summarises the capabilitybased access control mechanisms. There are other mechanisms such as TPM-based access control [47] that might be suitable for a particular MEC environment.…”
Section: ) Access Controlmentioning
confidence: 99%
“…Content may change prior to final publication. trust domains [47]- [49]. At the same time, considering the flexibility of the MEC architecture, achieving mutual authentication with anonymity and untraceability are crucial for data security and user privacy [50], [51].…”
Section: ) Identity and Authenticationmentioning
confidence: 99%
See 2 more Smart Citations
“…Ruan et al [26] proposed a flexible security architecture of Internet of Things access to edge cloud computing. Through multi-access edge cloud computing platform, the Internet of Things can connect to a nearby cloudlet, and then it can communicate with other devices, computers, or cloud resources.…”
Section: Relevant Workmentioning
confidence: 99%