Some computer science issues in ubiquitous computing
Communications of the ACM - Special issue on computer augmented environments: back to the real world
PGP source code and internals
Fundamental challenges in mobile computing
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Uniform random number generators: a review
Proceedings of the 29th conference on Winter simulation
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Password authentication with insecure communication
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Security: for ubiquitous computing
Security: for ubiquitous computing
System Software for Ubiquitous Computing
IEEE Pervasive Computing
INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
A Note on the Denial-of-Service Problem
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Improving Security for Ubiquitous Campus Applications
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
Context-Based Security Policies: A New Modeling Approach
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Context-Based Secure Resource Access in Pervasive Computing Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
PrudentExposure: A Private and User-centric Service Discovery Protocol
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
A Novel Cloud-Based Trust Model for Pervasive Computing
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Secure Context-Sensitive Authorization
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Security Architecture for Service-Based Mobile Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
System challenges for ubiquitous & pervasive computing
Proceedings of the 27th international conference on Software engineering
How Trusted Computers can Enhance for Privacy Preserving Mobile Applications
WOWMOM '05 Proceedings of the First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing - Volume 03
Developing a Model for Trust Management in Pervasive Devices
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols
IEEE Transactions on Mobile Computing
ITNG '06 Proceedings of the Third International Conference on Information Technology: New Generations
An Adaptive Lightweight Trust Reliant Secure Resource Discovery for Pervasive Computing Environments
PERCOM '06 Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
The computer for the 21st Century
IEEE Pervasive Computing
New directions in cryptography
IEEE Transactions on Information Theory
Home networking with Universal Plug and Play
IEEE Communications Magazine
An Approach to Analyzing Dynamic Trustworthy Service Composition
ASWC '09 Proceedings of the 4th Asian Conference on The Semantic Web
A new evidential trust model for open distributed systems
Expert Systems with Applications: An International Journal
An efficient service selection framework for pervasive environments
International Journal of Wireless and Mobile Computing
Hi-index | 0.25 |
To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of complex algorithms and powerful fixed infrastructure is infeasible due to the volatile nature of pervasive environment and tiny pervasive devices. In this paper, we present a trust-based secure Service discovery model, TSSD (trust-based secure service discovery) for a truly pervasive environment. Our model is a hybrid one that allows both secure and non-secure discovery of services. This model allows Service discovery and sharing based on mutual trust. The security model handles the communication and service sharing security issues. TSSD also incorporates a trust mode for sharing Services with unknown devices.