NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Simulated social control for secure Internet commerce
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Journal of Systems and Software
Key Management for Heterogeneous Ad Hoc Wireless Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Towards an Intrusion Detection System for Pervasive Computing Environments
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
Healthcare Aide: Towards a Virtual Assistant for Doctors Using Pervasive Middleware
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Trust Based Risk Management for Distributed System Security - A New Approach
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Intrusion detection aware component-based systems: A specification-based framework
Journal of Systems and Software
A Trust Framework for Pervasive Computing Environments
AICCSA '06 Proceedings of the IEEE International Conference on Computer Systems and Applications
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.01 |
One of the major problems in industrial security management is that most organizations or enterprises do not provide adequate guidelines or well-defined policy with respect to trust management, and trust is still an afterthought in most security engineering projects. With the increase of handheld devices, managers of business organizations tend to use handheld devices to access the information systems. However, the connection or access to an information system requires appropriate level of trust. In this paper, we present a flexible, manageable, and configurable software-based trust framework for the handheld devices of mangers to access distributed information systems. The presented framework minimizes the effects of malicious recommendations related to the trust from other devices or infrastructures. The framework allows managers to customize trust-related settings depending on network environments in an effort to create a more secure and functional network. To cope with the organizational structure of a large enterprise, within this framework, handheld devices of managers are broken down into different categories based upon available resources and desired security functionalities. The framework is implemented and applied to build a number of trust sensitive applications such as health care.