Trust in Pervasive Computing

نویسندگان

  • Jim Parker
  • Anand Patwardhan
  • Filip Perich
  • Anupam Joshi
  • Timothy W. Finin
چکیده

Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A Trust Analysis Methodology for Pervasive Computing Systems

We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that describe the typical use of the pervasive system by using a Trust Analysis Grid. The Trust Analysis Grid is composed of eleven Trust Issue Categories that cover the various aspects of the concept of trust in pervasive computing sys...

متن کامل

B-Trust: Bayesian Trust Framework for Pervasive Computing

Without trust, pervasive devices cannot collaborate effectively, and without collaboration, the pervasive computing vision cannot be made a reality. Distributed trust frameworks may support trust and thus foster collaboration in an hostile pervasive computing environment. Existing frameworks deal with foundational properties of computational trust. We here propose a distributed trust framework ...

متن کامل

A Context-based Trust Management Model for Pervasive Computing Systems

Trust plays an important role in making collaborative decisions about service evaluation and service selection in pervasive computing. Context is a fundamental concept in pervasive systems, which is based on the interpretation of environment and systems. The dynamic nature of context can strongly affect trust management and service selection. In this paper, we present a context-based trust mana...

متن کامل

An Efficient Feedback-based Trust Model for Pervasive Computing

In pervasive computing environments, pervasive devices should collaborate effectively such that the vision of pervasive computing will come true. However, without trust, pervasive devices cannot collaborate effectively. Distributed trust systems (DTS) may support trust and thus foster collaboration in hostile pervasive computing environments. The challenge for DTS is how to aggregate the local ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006