NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Untraceable Secret Credentials: Trust Establishment with Privacy
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A reputation-based trust management system for P2P networks
CCGRID '04 Proceedings of the 2004 IEEE International Symposium on Cluster Computing and the Grid
Performance Evaluation of Trust Management in Pervasive Computing
AINA '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications
Generalized Trust Negotiation for Pervasive Computing
CCCM '08 Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management - Volume 01
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Service Level Agreement Based Grid Scheduling
ICWS '08 Proceedings of the 2008 IEEE International Conference on Web Services
A secure mobile healthcare system using trust-based multicast scheme
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
A new reputation-based trust management mechanism against false feedbacks in peer-to-peer systems
WISE'07 Proceedings of the 8th international conference on Web information systems engineering
Trust management in ubiquitous computing: A Bayesian approach
Computer Communications
Open framework for distributed context management in ubiquitous environments
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
Pervasive computing is a decentralised open environment where different devices interact without prior knowledge of each other, involving a large amount of data. Evaluating the relationship among heterogeneous devices in pervasive computing environment is a challenging task. In a distributed pervasive environment a device might be interested in knowing whether a provider has the information security practices certified by international standard authorities and also has high reputation due to past transactions with other consumer. Therefore an integrated approach Policies and Recommendations is proposed in this paper. The concept of community is also introduced for efficient maintenance of devices so that the dynamic topology and mobility issues of ubiquitous devices are handled efficiently. The gossiping where and when the nodes are idle they exchange or share their history of interactions technique is highly useful in the proposed model to control false recommendation of malicious spies and to efficiently update trust values frequently.