End-to-End Trust Starts with Recognition

نویسندگان

  • Jean-Marc Seigneur
  • Stephen Farrell
  • Christian Damsgaard Jensen
  • Elizabeth Gray
  • Yong Chen
چکیده

Pervasive computing requires some level of trust to be established between entities. In this paper we argue for an entity recognition based approach to building this trust which differs from starting from more traditional authentication methods. We also argue for the concept of a “pluggable” recognition module which allows different recognition schemes to be used in different circumstances. Finally, we propose that the trust in the underlying infrastructure has to be taken into account when considering end-to-end trust.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Trust Based Secured Source Routing Using Fuzzy Logic Rules Prediction in Mobile Ad Hoc Networks

G. Santhi, Assistant Professor, Dept. of Information technology, Pondicherry Engineering College, India. AbstractIn mobile ad-hoc network, nodes cannot rely on any fixed infrastructure for routing purposes. Since MANET routing is a cooperative process where route information is relayed between nodes, any secure routing mechanism must evaluate the trustworthiness of other nodes. In this research...

متن کامل

A Peer-to-peer Secure VoIP Architecture

Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used over the Internet. The Session Initiation Protocol (SIP) is the current signaling standard for such applications and allows users to establish and negotiate any end-to-end multimedia session. Unfortunately current SIP-based platforms use a centralized architecture where calls between User A...

متن کامل

Modeling and Solving the Multi-depot Vehicle Routing Problem with Time Window by Considering the Flexible end Depot in Each Route

This paper considers the multi-depot vehicle routing problem with time window in which each vehicle starts from a depot and there is no need to return to its primary depot after serving customers. The mathematical model which is developed by new approach aims to minimizing the transportation cost including the travelled distance, the latest and the earliest arrival time penalties. Furthermore, ...

متن کامل

Trust, Security and Privacy in Global Computing

During the past thirty years, the world of computing has evolved from large centralised computing centres to an increasingly distributed computing environment, where computation and communication capabilities are being embedded in artefacts of everyday life. Billions of computational entities will interact in systems with ever changing configurations determined by local and global context, for ...

متن کامل

Some Autecological Properties of Medicinal Plant of Salvia hydrangea L. in Mazandaran, Iran

The study of plant under environmental conditions leads to an appreciation of their physical and chemical requirements for growth and reproduction. It contributes to increase the knowledge of where the plants grow. This study was conducted to determine the main autecological characteristics of Salvia hydrangea L. which is an endemic plant distributed in Mazanadarn province, Iran. The habitats o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003