NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The right type of trust for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
PGP: Pretty Good Privacy
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Trust for Ubiquitous, Transparent Collaboration
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Propagation of trust and distrust
Proceedings of the 13th international conference on World Wide Web
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
A Novel Cloud-Based Trust Model for Pervasive Computing
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
A Learning Model for Trustworthiness of Context-Awareness Services
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Trust Enhanced Security for Mobile Agents
CEC '05 Proceedings of the Seventh IEEE International Conference on E-Commerce Technology
Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables,
Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables,
A Trust Model for Ubiquitous Systems based on Vectors of Trust Values
ISM '05 Proceedings of the Seventh IEEE International Symposium on Multimedia
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
A Trust Framework for Pervasive Computing Environments
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
Privacy Challenges in Context-sensitive Access Control for Pervasive Computing Environment
MOBIQUITOUS '07 Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous)
B-Trust: bayesian trust framework for pervasive computing
iTrust'06 Proceedings of the 4th international conference on Trust Management
ISWC'06 Proceedings of the 5th international conference on The Semantic Web
IEEE Network: The Magazine of Global Internetworking
Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments
Proceedings of the 2009 international conference on Pervasive services
Hi-index | 0.00 |
In such as a highly dynamic and open environment, it has become a challenge to deploy multiple context-sensitive services due to the unwillingness of service provider to share resources. This apprehension to share resources stems mainly from a lack of trust. Sometimes infrastructure plays pivotal role to solve this issue with dynamic access control to replace traditional static policies. But when it comes to effective resource sharing in an infrastructure-less environment we face problems such as poor storage and computational capability. In this paper, we have developed a lightweight and distributed trust model based on recommendation, which will guarantee that service providers can securely share an unlimited number of resources, limited only by their hardware and bandwidth limitations. The multi-hop recommendation protocol incorporates a flexible behavioral model to handle interactions during service sharing and usage. This protocol will also assess risk using recommendations from context-sensitive services, in the trust framework, to help ensure smooth access to resources and services.