2022
DOI: 10.1016/j.jnca.2022.103402
|View full text |Cite
|
Sign up to set email alerts
|

A review on trust management in fog/edge computing: Techniques, trends, and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 94 publications
0
7
0
Order By: Relevance
“…In this section, we present an overview of the related work in the context of Web and cloud services. Comprehensive literature reviews about the topic are available in [37][38][39][40].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we present an overview of the related work in the context of Web and cloud services. Comprehensive literature reviews about the topic are available in [37][38][39][40].…”
Section: Related Workmentioning
confidence: 99%
“…A professional inspector may evaluate all games, or the highest-scoring game that meets a criterion may be indicated by Nikravan and Kashani. 9 For enrolment, verification, or identification, multimodal biometric systems utilize more than one physiological or behavioral trait. The NIST report recommends using several biometrics in a tiered strategy.…”
Section: Basic Biometric System Operationsmentioning
confidence: 99%
“…Unless the similarity rating exceeds a certain threshold, any or many matches are displayed. A professional inspector may evaluate all games, or the highest‐scoring game that meets a criterion may be indicated by Nikravan and Kashani 9 . For enrolment, verification, or identification, multimodal biometric systems utilize more than one physiological or behavioral trait.…”
Section: Review Of Related Workmentioning
confidence: 99%
“…The method relies on continuous message expansion. The technique helps to mitigate against smart gateway and eavesdropping attacks, which are frequently conducted against resource allocation algorithms, according to formal analysis results [7]. The suggested technique is also strong because it completely resists key compromise and satisfies user privacy concerns.…”
Section: A Related Work In Edge Computingmentioning
confidence: 99%
“…Privacy-preserving. Fog-enabled aggregation is the name of the smart metering aggregation framework that [7].…”
Section: A Related Work In Edge Computingmentioning
confidence: 99%