Trustworthiness and authentication in ubiquitous computing

  • Authors:
  • Hannan Xiao;James Malcolm;Bruce Christianson;Ying Zhang

  • Affiliations:
  • University of Hertfordshire, Hatfield, Hertfordshire, United Kingdom;University of Hertfordshire, Hatfield, Hertfordshire, United Kingdom;University of Hertfordshire, Hatfield, Hertfordshire, United Kingdom;University of Cambridge, Cambridge, United Kingdom

  • Venue:
  • Proceedings of the 10th ACM international symposium on Mobility management and wireless access
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a pervasive computing environment, principle authentication verifies if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approach for implementing trustworthy authentication and related work are also presented.