{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:43:37Z","timestamp":1742996617063,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031490101"},{"type":"electronic","value":"9783031490118"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-49011-8_36","type":"book-chapter","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T16:03:27Z","timestamp":1702569807000},"page":"453-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Artificial Intelligence for Trust Management Systems in Fog Computing: A Comprehensive Study"],"prefix":"10.1007","author":[{"given":"Mohamed Abdel","family":"Rahman","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Dahroug","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9593-6909","authenticated-orcid":false,"given":"Sherin M.","family":"Moussa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,15]]},"reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2019.10.006","volume":"137","author":"M Al-Khafajiy","year":"2020","unstructured":"Al-Khafajiy, M., et al.: COMITMENT: s fog computing trust management approach. J. Parallel Distrib. Comput. 137, 1\u201316 (2020)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"1","key":"36_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/jsan8010016","volume":"8","author":"N Abbas","year":"2019","unstructured":"Abbas, N., Asim, M., Tariq, N., Baker, T., Abbas, S.: A mechanism for securing IoT-enabled applications at the fog layer. J. Sens. Actuator Netw. 8(1), 16 (2019)","journal-title":"J. Sens. Actuator Netw."},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Baker, T., Asim, M., MacDermott, \u00c1., Iqbal, F., Kamoun, F., Shah, B., Alfandi, O., Hammoudeh, M.: A secure fog-based platform for SCADA-based IoT critical infrastructure. Softw. - Pract. Exp. (2019)","DOI":"10.1002\/spe.2688"},{"issue":"6","key":"36_CR4","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., Zhang, T.: Fog and IoT: An overview of research opportunities. IEEE Internet Things J. 3(6), 854\u2013864 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"36_CR5","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/COMST.2017.2762345","volume":"20","author":"J Ni","year":"2017","unstructured":"Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for Internet of Things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601\u2013628 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 685\u2013695. Springer (2015)","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.future.2018.04.057","volume":"87","author":"M Aazam","year":"2018","unstructured":"Aazam, M., Zeadally, S., Harras, K.A.: Offloading in fog computing for IoT: review, enabling technologies, and research opportunities. Future Gener. Comput. Syst. 87, 278\u2013289 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Zou, Z., et al.: Edge and fog computing enabled AI for IoT-an overview. In: 2019 IEEE International Conference on Artificial Intelligence Circuits and Systems (AICAS). IEEE (2019)","DOI":"10.1109\/AICAS.2019.8771621"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Singh, S., Kandpal, M.: A comprehensive survey on trust management in fog computing. In: ICT Analysis and Applications, pp. 87\u201397 (2022)","DOI":"10.1007\/978-981-16-5655-2_9"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Guo, J., Chen, R.: A classification of trust computation models for service-oriented internet of things systems. In: 2015 IEEE International Conference on Services Computing. IEEE (2015)","DOI":"10.1109\/SCC.2015.52"},{"key":"36_CR11","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings 1996 IEEE Symposium on Security and Privacy. IEEE (1996)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Manvi, S.S., Chandra Gowda, N.: Trust management in fog computing: a survey. In: Applying Integration Techniques and Methods in Distributed Systems and Technologies, pp. 34\u201348. IGI global (2019)","DOI":"10.4018\/978-1-5225-8295-3.ch002"},{"key":"36_CR13","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.future.2018.05.008","volume":"88","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Zhou, M., Fortino, G.: Security and trust issues in fog computing: a survey. Futur. Gener. Comput. Syst. 88, 16\u201327 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Sadique, K.M., Rahmani, R., Johannesson, P.: Fog computing for trust in the Internet of Things (IoT): a systematic literature review. In: 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA). IEEE (2020)","DOI":"10.1109\/ICCSEA49143.2020.9132861"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Nikravan, M., Haghi Kashani, M.: A review on trust management in fog\/edge computing: techniques, trends, and challenges. J. Netw. Comput. Appl. 103402 (2022)","DOI":"10.1016\/j.jnca.2022.103402"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Patwary, A.A.-N., et al.: Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control. Electronics 10(10), 1171 (2021)","DOI":"10.3390\/electronics10101171"},{"key":"36_CR17","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/s10776-020-00499-z","volume":"28","author":"R Verma","year":"2021","unstructured":"Verma, R., Chandra, S.: A systematic survey on fog steered IoT: architecture, prevalent threats and trust models. Int. J. Wirel. Inf. Netw. 28, 116\u2013133 (2021)","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"36_CR18","doi-asserted-by":"crossref","unstructured":"Konsta, A.M., Lluch Lafuente, A., Dragoni, N.: Trust Management for Internet of Things: a systematic literature review. arXiv preprint. arXiv:2211.01712 (2022)","DOI":"10.1109\/ACCESS.2023.3327335"},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Sharma, A., et al.: Towards trustworthy Internet of Things: a survey on trust management applications and schemes. Comput. Commun. 160, 475\u2013493 (2020)","DOI":"10.1016\/j.comcom.2020.06.030"},{"key":"36_CR20","doi-asserted-by":"crossref","unstructured":"Shehada, D., et al.: Fog-based distributed trust and reputation management system for internet of things. J. King Saud Univ.-Comput. Inf. Sci. 34(10), 8637\u20138646 (2022)","DOI":"10.1016\/j.jksuci.2021.10.006"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Rathee, G., et al.: A trust computed framework for IoT devices and fog computing environment. Wirel. Netw. 26, 2339\u20132351 (2020)","DOI":"10.1007\/s11276-019-02106-3"},{"key":"36_CR22","doi-asserted-by":"crossref","unstructured":"Wang, T., et al.: A novel trust mechanism based on fog computing in sensor\u2013cloud system. Future Gener. Comput. Syst. 109, 573\u2013582 (2020)","DOI":"10.1016\/j.future.2018.05.049"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Gao, Z., et al.: A credible and lightweight multidimensional trust evaluation mechanism for service-oriented IoT edge computing environment. In: 2019 IEEE International Congress on Internet of Things (ICIOT). IEEE (2019)","DOI":"10.1109\/ICIOT.2019.00035"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Hamza, M., et al.: A social qualitative trust framework for Fog computing. Comput. Electr. Eng. 102, 108195 (2022)","DOI":"10.1016\/j.compeleceng.2022.108195"},{"key":"36_CR25","doi-asserted-by":"crossref","unstructured":"Ogundoyin, S.O., Adeniyi Kamil, I.: A trust management system for fog computing services. Internet of Things 14, 100382 (2021)","DOI":"10.1016\/j.iot.2021.100382"},{"key":"36_CR26","doi-asserted-by":"crossref","unstructured":"Al Muhtadi, J., et al.: Subjective logic-based trust model for fog computing. Comput. Commun. 178, 221\u2013233 (2021)","DOI":"10.1016\/j.comcom.2021.05.016"},{"key":"36_CR27","doi-asserted-by":"crossref","unstructured":"Alemneh, E., et al.: A two-way trust management system for fog computing. Future Gener. Comput. Syst. 106, 206\u2013220 (2020)","DOI":"10.1016\/j.future.2019.12.045"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Rahman, F.H., et al.: Find my trustworthy fogs: a fuzzy-based trust evaluation framework. Future Gener. Comput. Syst. 109, 562\u2013572 (2020)","DOI":"10.1016\/j.future.2018.05.061"},{"key":"36_CR29","doi-asserted-by":"crossref","unstructured":"Junejo, A.K., et al.: Trustee: A trust management system for fog-enabled cyber physical systems. IEEE Trans. Emerg. Topics Comput. 9(4), 2030\u20132041 (2019)","DOI":"10.1109\/TETC.2019.2957394"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-49011-8_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T16:10:39Z","timestamp":1702570239000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-49011-8_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031490101","9783031490118"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-49011-8_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EPIA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EPIA Conference on Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faial Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"epia2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/epia2023.inesctec.pt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"163","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}