A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Project Aura: Toward Distraction-Free Pervasive Computing
IEEE Pervasive Computing
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Information Agents for Mobile and Embedded Devices
CIA '01 Proceedings of the 5th International Workshop on Cooperative Information Agents V
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Understanding Trust Management Systems
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
How much is "enough"? Risk in Trust-Based Access Control
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Implementing access control to people location information
Proceedings of the ninth ACM symposium on Access control models and technologies
Smart dust, friend or foe?: replacing identity with configuration trust
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Military communications systems and technologies
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Secure resource sharing on cross-organization collaboration using a novel trust method
Robotics and Computer-Integrated Manufacturing
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
Expert Systems with Applications: An International Journal
Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
Journal of Systems and Software
Trust-based filtering for augmented reality
iTrust'03 Proceedings of the 1st international conference on Trust management
CBTM: a trust model with uncertainty quantification and reasoning for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Pseudonymity in the light of evidence-based trust
SP'04 Proceedings of the 12th international conference on Security Protocols
Trust lifecycle management in a global computing environment
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
An Effective Model for Indirect Trust Computation in Pervasive Computing Environment
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. This is illustrated with applications such as personal address books and electronic diaries. Recommendations associate categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.