The SAHARA Model for Service Composition across Multiple Providers
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
A Reactive Service Composition Architecture for Pervasive Computing Environments
PWC '02 Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
SpiderNet: An Integrated Peer-to-Peer Service Composition Framework
HPDC '04 Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing
Enforcing Secure Service Composition
CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
Composition Trust Bindings in Pervasive Computing Service Composition
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Virtual observers in a mobile surveillance system
MULTIMEDIA '06 Proceedings of the 14th annual ACM international conference on Multimedia
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Dynamic Service Composition in Pervasive Computing
IEEE Transactions on Parallel and Distributed Systems
Socialtrust: tamper-resilient trust establishment in online communities
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems
P2P '08 Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing
Internet social network communities: Risk taking, trust, and privacy concerns
Computers in Human Behavior
DTT: A Distributed Trust Toolkit for pervasive systems
PERCOM '09 Proceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications
Hi-index | 0.00 |
Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties.