A logic for uncertain probabilities
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Project Aura: Toward Distraction-Free Pervasive Computing
IEEE Pervasive Computing
Access Control and Trust in the Use of Widely Distributed Services
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Supporting Trust in Virtual Communities
HICSS '00 Proceedings of the 33rd Hawaii International Conference on System Sciences-Volume 6 - Volume 6
Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 7 - Volume 7
Understanding Trust Management Systems
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Social Science Computer Review
Ubiquitous collaborative iTrust service: Exploring proximity collective wisdom
Information Systems Frontiers
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 2
Managing risks in RBAC employed distributed environments
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Review: A framework for awareness maintenance
Journal of Network and Computer Applications
Enforcing trust in pervasive computing with trusted computing technology
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
A dynamic trust model based on naive bayes classifier for ubiquitous environments
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
A requirements-driven trust framework for secure interoperation in open environments
iTrust'06 Proceedings of the 4th international conference on Trust Management
Combining trust and risk to reduce the cost of attacks
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.