A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency
ACSC '08 Proceedings of the thirty-first Australasian conference on Computer science - Volume 74
A Demonstrative Ad Hoc Attestation System
ISC '08 Proceedings of the 11th international conference on Information Security
A trust management scheme for enhancing security in pervasive wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Trust management in ubiquitous computing: A Bayesian approach
Computer Communications
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
Deterministic trust management in pervasive computing
Journal of Mobile Multimedia
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
The burden of proof and the optimal security investment of firms in ubiquitous computing
Personal and Ubiquitous Computing
Hi-index | 0.00 |
This paper examines five security problems that arebarriers to mainstream pervasive computing. Theseare: device authentication, privacy, trust management,device assurance, recourse, and availability. Thepaper argues that the trust, security, and privacyissues inherent in pervasive computing environmentspresent unique challenges that require a fundamentalre-examination of how to build large-scale,trustworthy, distributed systems.