An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Active Rules in Database Systems
Active Rules in Database Systems
System Software for Ubiquitous Computing
IEEE Pervasive Computing
Using Trust for Secure Collaboration in Uncertain Environments
IEEE Pervasive Computing
Trust management tools for internet applications
iTrust'03 Proceedings of the 1st international conference on Trust management
Towards security monitoring patterns
Proceedings of the 2007 ACM symposium on Applied computing
CAT: a context-aware trust model for open and dynamic systems
Proceedings of the 2008 ACM symposium on Applied computing
Balancing intrusion detection resources in ubiquitous computing networks
Computer Communications
ATM: an automatic trust monitoring algorithm for service software
Proceedings of the 2009 ACM symposium on Applied Computing
A new monitor model for enhancing trust-based systems
ATC'10 Proceedings of the 7th international conference on Autonomic and trusted computing
Gathering experience in trust-based interactions
iTrust'06 Proceedings of the 4th international conference on Trust Management
Trust management issues for ad hoc and self-organized networks
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Trust-based authentication scheme with user rating for low-resource devices in smart environments
Personal and Ubiquitous Computing
IKEv2 authentication exchange model and performance analysis in mobile IPv6 networks
Personal and Ubiquitous Computing
Smart environment interaction: A user assessment of embedded agents
Journal of Ambient Intelligence and Smart Environments - Intelligent agents in Ambient Intelligence and smart environments
Hi-index | 0.00 |
The requirement for spontaneous interaction in ubiquitous computing creates security issues over and above those present in other areas of computing, deeming traditional approaches ineffective. As a result, to support secure collaborations entities must implement self-protective measures. Trust management is a solution well suited to this task as reasoning about future interactions is based on the outcome of past ones. This requires monitoring of interactions as they take place. Such monitoring also allows us to take corrective action when interactions are proceeding unsatisfactorily. In this vein, we first present a trust-based model of interaction based on event structures. We then describe our ongoing work in the development of a monitor architecture which enables self-protective actions to be carried out at critical points during principal interaction. Finally, we discuss some potential directions for future work.