Connecting the Physical World with Pervasive Networks
IEEE Pervasive Computing
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
A Computational Model of Trust and Reputation for E-businesses
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 7 - Volume 7
Trust in Electronic Environments
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 9 - Volume 9
People, places, things: Web presence for the real world
WMCSA '00 Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00)
Centaurus: A Framework for Intelligent Services in a Mobile Environment
ICDCSW '01 Proceedings of the 21st International Conference on Distributed Computing Systems
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
The butt of the iceberg: hidden security problems of ubiquitous systems
Ambient intelligence
An Access Control Model Based on Distributed Knowledge Management
AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
Trusting collaboration in global computing systems
iTrust'03 Proceedings of the 1st international conference on Trust management
Security for whom? the shifting security assumptions of pervasive computing
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Intelligent Spaces — The Vision, the Opportunities and the Barriers
BT Technology Journal
The Implications of Pervasive Computing on Network Design
BT Technology Journal
Hi-index | 0.00 |
The pervasive environment implies a massive increase in the scale of systems, the heterogeneity of devices and diversity in services available, making the complex task of centrally managing the environment unfeasible. The scope and role of trusted third parties in facilitating trust is also reduced because of the high number of bilateral trust relationships, which cannot be predefined and managed statically. Moreover, the dynamic, mobile and asynchronous nature of many of the devices means that it is difficult to predict their state or context of operation from moment to moment. All this adds up to increased uncertainty and a need for a revision of the methods and concepts used to express and assess trust and provide assurance. This work addresses this need by defining realistic models of digital trust that are capable of dealing with the uncertainties inherent in the environment and that are aware of the contexts of interactions in evaluating trust.