A study of trust & privacy models in pervasive computing

H Khiabani, JL Ab Manan… - … Conference for Technical …, 2009 - ieeexplore.ieee.org
The pervasive systems are weaving themselves in our daily life, making it possible to collect
user information invisibly, in an unobtrusive manner by even unknown parties. So trust and …

Towards a unified trust model in pervasive systems

H Khiabani, ZM Sidek… - 2010 IEEE 24th …, 2010 - ieeexplore.ieee.org
The pervasive systems are weaving themselves in our daily life, making it possible to collect
user information invisibly, in an unobtrusive manner by even unknown parties. So run time …

A trust model for pervasive computing environments

S Yin, I Ray, I Ray - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
With the growth of mobile and sensor devices, embedded systems, and communication
technologies, we are moving towards an era of pervasive computing. Pervasive computing …

Performance evaluation of trust management in pervasive computing

T Sun, MK Denko - 22nd International Conference on …, 2008 - ieeexplore.ieee.org
In pervasive computing, interactions are possible among users, devices and applications
anytime and anywhere. Security and privacy are critical issues in this environment because …

An artificial intelligence-based trust model for pervasive computing

G DAngelo, S Rampone… - 2015 10th international …, 2015 - ieeexplore.ieee.org
Pervasive Computing is one of the latest and more advanced paradigms currently available
in the computers arena. Its ability to provide the distribution of computational services within …

A Trust Model in Pervasive Computing

J Wang, Z Yang, Y Chen, W Kou… - 2008 Third International …, 2008 - ieeexplore.ieee.org
Security and privacy is a big problem that feazing computer researchers all along. In the
pervasive computing, because the traditional methods of user authorization and access …

Trustworthy pervasive computing: The hard security problems

K Ranganathan - … Workshops, 2004. Proceedings of the Second, 2004 - ieeexplore.ieee.org
We examine five security problems that are barriers to mainstream pervasive computing.
These are: device authentication, privacy, trust management, device assurance, recourse …

Pervasive trusted computing

S Balfe, S Li, J Zhou - … Workshop on Security, Privacy and Trust …, 2006 - ieeexplore.ieee.org
This paper analyses the role trusted computing can play in a pervasive/ubiquitous
environment. Traditionally, the ideology of Weiser (1991) and others when considering the …

Probabilistic trust management in pervasive computing

MK Deno, T Sun - 2008 IEEE/IFIP International Conference on …, 2008 - ieeexplore.ieee.org
In this paper, we propose a probabilistic trust management approach for pervasive
computing environment. The approach considers trust value as a probability that a device …

A distributed trust management scheme in the pervasive computing environment

T Sun, MK Denko - 2007 Canadian Conference on Electrical …, 2007 - ieeexplore.ieee.org
Pervasive computing allows a seamless interaction among users, devices, and applications,
anytime and anywhere. Yet portable devices in pervasive computing are mainly powered by …