RBAC on the Web by smart certificates
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Mobile commerce: framework, applications and networking support
Mobile Networks and Applications
The future of business services in the age of ubiquitous computing
Communications of the ACM
Building customer trust in mobile commerce
Communications of the ACM - Digital rights management
Mobile computing in the retail arena
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Developing Consumer-Friendly Pervasive Retail Systems
IEEE Pervasive Computing
Understanding mobile handheld device use and adoption
Communications of the ACM - Mobile computing opportunities and challenges
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy in pervasive environments: next generation labeling protocols
Personal and Ubiquitous Computing
Consumer perceptions of privacy, security and trust in ubiquitous commerce
Personal and Ubiquitous Computing
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
A Design Methodology for User Access Control (UAC) Middleware
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
Keeping ubiquitous computing to yourself: a practical model for user control of privacy
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
The trouble with login: on usability and computer security in ubiquitous computing
Personal and Ubiquitous Computing
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
An architecture for unifying web services authentication and authorization
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
Securing admission control in ubiquitous computing environment
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
An enhanced architecture for mobile retailing
Mobility '06 Proceedings of the 3rd international conference on Mobile technology, applications & systems
A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
Telehealth and ubiquitous computing for bandwidth-constrained rural and remote areas
Personal and Ubiquitous Computing
Hi-index | 0.01 |
While pervasive computing provides a potentially vast business opportunity for many industry participants, it also carries challenges along with it. In this paper, a passport-based architecture has been proposed to convert this unpredictable, highly dynamic pervasive environment into a trusted business platform. It utilizes the widely accepted passport concept here named MobiPass to evaluate and classify the potential mobile entities into a trustworthy form. It allows fine-grained access control without necessarily having had prior interaction with or knowledge of other parties and environments by setting customized rules against a MobiPolicy. A detailed case study has been introduced to demonstrate how the MobiPass architecture can help customers and retailers to build a strong trusted connection and how the shopping experience can be enriched and efficiency improved.