{"id":"https://openalex.org/W3158329000","doi":"https://doi.org/10.1145/3412841.3441898","title":"Trust assessment in 32 KiB of RAM","display_name":"Trust assessment in 32 KiB of RAM","publication_year":2021,"publication_date":"2021-03-22","ids":{"openalex":"https://openalex.org/W3158329000","doi":"https://doi.org/10.1145/3412841.3441898","mag":"3158329000"},"language":"en","primary_location":{"id":"doi:10.1145/3412841.3441898","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3412841.3441898","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3412841.3441898","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 36th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3412841.3441898","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064143171","display_name":"Matthew Bradbury","orcid":"https://orcid.org/0000-0003-4661-000X"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Matthew Bradbury","raw_affiliation_strings":["University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005426902","display_name":"Arshad Jhumka","orcid":"https://orcid.org/0000-0003-0540-2845"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Arshad Jhumka","raw_affiliation_strings":["University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030510462","display_name":"Tim Watson","orcid":"https://orcid.org/0000-0002-3841-3332"},"institutions":[{"id":"https://openalex.org/I39555362","display_name":"University of Warwick","ror":"https://ror.org/01a77tt86","country_code":"GB","type":"education","lineage":["https://openalex.org/I39555362"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tim Watson","raw_affiliation_strings":["University of Warwick, Coventry, UK"],"affiliations":[{"raw_affiliation_string":"University of Warwick, Coventry, UK","institution_ids":["https://openalex.org/I39555362"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064143171"],"corresponding_institution_ids":["https://openalex.org/I39555362"],"apc_list":null,"apc_paid":null,"fwci":0.4801,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.65657167,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"184","last_page":"193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.864376425743103},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.5631346702575684},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5159524083137512},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.497988224029541},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.4699955880641937},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.46533718705177307},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4644731283187866},{"id":"https://openalex.org/keywords/reputation-system","display_name":"Reputation system","score":0.4624614417552948},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.46196386218070984},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4590207040309906},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4495691657066345},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4343535304069519},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3857465386390686},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34407228231430054},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.28705647587776184},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.2798928916454315},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13044321537017822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.864376425743103},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.5631346702575684},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5159524083137512},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.497988224029541},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.4699955880641937},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.46533718705177307},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4644731283187866},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.4624614417552948},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.46196386218070984},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4590207040309906},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4495691657066345},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4343535304069519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3857465386390686},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34407228231430054},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.28705647587776184},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2798928916454315},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13044321537017822},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3412841.3441898","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3412841.3441898","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3412841.3441898","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 36th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:wrap.warwick.ac.uk:145715","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400665","display_name":"Warwick Research Archive Portal (University of Warwick)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I39555362","host_organization_name":"University of Warwick","host_organization_lineage":["https://openalex.org/I39555362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference Item"}],"best_oa_location":{"id":"doi:10.1145/3412841.3441898","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3412841.3441898","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3412841.3441898","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 36th Annual ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G521268540","display_name":"PETRAS 2","funder_award_id":"EP/S035362/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3158329000.pdf","grobid_xml":"https://content.openalex.org/works/W3158329000.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1456833637","https://openalex.org/W1547033387","https://openalex.org/W1604936042","https://openalex.org/W2047301871","https://openalex.org/W2125555950","https://openalex.org/W2126601274","https://openalex.org/W2129633982","https://openalex.org/W2161566505","https://openalex.org/W2165303182","https://openalex.org/W2234639732","https://openalex.org/W2286477783","https://openalex.org/W2291790378","https://openalex.org/W2311411768","https://openalex.org/W2325877089","https://openalex.org/W2594560857","https://openalex.org/W2617557114","https://openalex.org/W2791403216","https://openalex.org/W2791432311","https://openalex.org/W2795042312","https://openalex.org/W2803615336","https://openalex.org/W2901332628","https://openalex.org/W2974654731","https://openalex.org/W2981269137","https://openalex.org/W2981854649","https://openalex.org/W2987635953","https://openalex.org/W3009894600","https://openalex.org/W3016097478","https://openalex.org/W3018740610","https://openalex.org/W3044414081","https://openalex.org/W3046054138","https://openalex.org/W3106445841","https://openalex.org/W3109508055","https://openalex.org/W3147166162","https://openalex.org/W4254098104","https://openalex.org/W4393770423"],"related_works":["https://openalex.org/W96612179","https://openalex.org/W2770234245","https://openalex.org/W2566006169","https://openalex.org/W2987774938","https://openalex.org/W632915154","https://openalex.org/W1572062910","https://openalex.org/W2135915660","https://openalex.org/W2154149090","https://openalex.org/W1518382739","https://openalex.org/W2366964182"],"abstract_inverted_index":{"There":[0],"is":[1,75,82],"an":[2,145],"increasing":[3],"demand":[4],"for":[5,45,106],"Internet":[6],"of":[7,12,121,133,141,148],"Things":[8],"(IoT)":[9],"systems":[10],"comprised":[11],"resource-constrained":[13],"sensor":[14],"and":[15,35,119,126],"actuator":[16],"nodes":[17,57],"executing":[18],"increasingly":[19],"complex":[20],"applications,":[21],"possibly":[22],"simultaneously.":[23],"IoT":[24,135],"devices":[25],"will":[26,36,127],"not":[27],"be":[28,70],"able":[29],"to":[30,84],"execute":[31],"computationally":[32],"expensive":[33],"tasks":[34],"require":[37],"more":[38,77],"powerful":[39,56],"computing":[40],"nodes,":[41,44],"called":[42,51],"edge":[43,65],"such":[46,86,92],"execution,":[47],"in":[48,123],"a":[49,60,68,101],"process":[50],"computation":[52,107],"offloading.":[53],"When":[54],"multiple":[55],"are":[58],"available,":[59],"selection":[61],"problem":[62,74],"arises:":[63],"which":[64],"node":[66],"should":[67],"task":[69],"submitted":[71],"to?":[72],"This":[73],"even":[76],"acute":[78],"when":[79],"the":[80,130,139,142],"system":[81,94,104,114],"subjected":[83],"attacks,":[85],"as":[87,93],"DoS,":[88],"or":[89],"network":[90],"perturbations":[91],"overload.":[95],"In":[96],"this":[97],"paper,":[98],"we":[99],"present":[100],"trust":[102,152],"model-based":[103],"architecture":[105,115,143],"offloading,":[108],"based":[109],"on":[110,154],"behavioural":[111],"evidence.":[112],"The":[113],"provides":[116],"confidentiality,":[117],"authentication":[118],"non-repudiation":[120],"messages":[122],"required":[124],"scenarios":[125],"operate":[128],"within":[129],"resource":[131],"constraints":[132],"embedded":[134],"nodes.":[136],"We":[137],"demonstrate":[138],"viability":[140],"with":[144],"example":[146],"deployment":[147],"Beta":[149],"Reputation":[150],"System":[151],"model":[153],"real":[155],"hardware.":[156]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2021-05-10T00:00:00"}
