Pervasive computing: what is it good for?
Proceedings of the 1st ACM international workshop on Data engineering for wireless and mobile access
Safety Critical Computer Systems
Safety Critical Computer Systems
IEEE Intelligent Systems
Proceedings of the 1st international conference on Trust management
iTrust'03 Proceedings of the 1st international conference on Trust management
A trust matrix model for electronic commerce
iTrust'03 Proceedings of the 1st international conference on Trust management
Designing for privacy in a multi-agent world
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Trust management in ubiquitous computing: A Bayesian approach
Computer Communications
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
Hi-index | 0.00 |
We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that describe the typical use of the pervasive system by using a Trust Analysis Grid. The Trust Analysis Grid is composed of eleven Trust Issue Categories that cover the various aspects of the concept of trust in pervasive computing systems. The Trust Analysis Grid is then used to guide the design of the pervasive computing system.