Towards a unified trust model in pervasive systems

H Khiabani, ZM Sidek… - 2010 IEEE 24th …, 2010 - ieeexplore.ieee.org
The pervasive systems are weaving themselves in our daily life, making it possible to collect
user information invisibly, in an unobtrusive manner by even unknown parties. So run time …

A study of trust & privacy models in pervasive computing

H Khiabani, JL Ab Manan… - … Conference for Technical …, 2009 - ieeexplore.ieee.org
The pervasive systems are weaving themselves in our daily life, making it possible to collect
user information invisibly, in an unobtrusive manner by even unknown parties. So trust and …

Feeltrust: providing trustworthy communications in ubiquitous mobile environment

G Carullo, A Castiglione, G Cattaneo… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
The growing intelligence and popularity of smartphones and the advances in Mobile
Ubiquitous Computing have resulted in rapid proliferation of data-sharing applications …

A trust model for pervasive computing environments

S Yin, I Ray, I Ray - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
With the growth of mobile and sensor devices, embedded systems, and communication
technologies, we are moving towards an era of pervasive computing. Pervasive computing …

A Trust Model in Pervasive Computing

J Wang, Z Yang, Y Chen, W Kou… - 2008 Third International …, 2008 - ieeexplore.ieee.org
Security and privacy is a big problem that feazing computer researchers all along. In the
pervasive computing, because the traditional methods of user authorization and access …

Autonomic trust prediction for pervasive systems

L Capra, M Musolesi - … and Applications-Volume 1 (AINA'06), 2006 - ieeexplore.ieee.org
In recent years, various trust management models based on the human notion of trust have
been proposed to support trust-aware decision making in pervasive systems. However, the …

Dtt: A distributed trust toolkit for pervasive systems

B Lagesse, M Kumar, JM Paluska… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Effective security mechanisms are essential to the widespread deployment of pervasive
systems. Much of the research focus on security in pervasive computing has revolved …

A trust-based service evaluation and selection model in pervasive computing environment

Z Chen, L Ge, H Wang, X Huang… - 2006 First International …, 2006 - ieeexplore.ieee.org
In pervasive computing, service evaluation and selection play an important role due to its
high dynamics, complex context and catholicity characters. An effective model helps …

Research on trust management model in pervasive computing

Z Jian-Yong - 2007 2nd International Conference on Pervasive …, 2007 - ieeexplore.ieee.org
Pervasive computing being a new management model, it has changed the computing
consideration of people radically. Due to the pervasive computing need to be combined from …

Multilevel trust management framework for pervasive computing

Z Dong, Z Yian, L Wanbao, G Jianhua… - … Discovery and Data …, 2010 - ieeexplore.ieee.org
A multilevel trust management framework in pervasive environment is proposed in this
paper. In the framework, the trust, the reputation, reciprocity and related concepts are …