Probabilistic trust management in pervasive computing

MK Deno, T Sun - … on Embedded and Ubiquitous Computing, 2008 - ieeexplore.ieee.org
trust management approach for pervasive computing environment. The approach considers
trust … A distributed trust management using recommendation was constructed. An iterative …

Trust-based security in pervasive computing environments

L Kagal, T Finin, A Joshi - Computer, 2001 - ieeexplore.ieee.org
… We believe that trust will add a new dimension to pervasive computing, allowing greater
flexibility in designing policies and providing more control over accessing services and …

A security architecture based on trust management for pervasive computing systems

L Kagal, F Perich, A Joshi, T Finin - … of Women in Computing, 2002 - ebiquity.umbc.edu
trust management which involves developing a security policy, assigning credentials to entities,
verifying that the credentials conform to the policy, delegating trusttrust management to …

Performance evaluation of trust management in pervasive computing

T Sun, MK Denko - 22nd International Conference on …, 2008 - ieeexplore.ieee.org
… as pervasive computing. When we design a trust management solution in pervasive computing,
one of the things we need to determine is the specific characteristics of trust in this field. …

A distributed trust management scheme in the pervasive computing environment

T Sun, MK Denko - … Conference on Electrical and Computer …, 2007 - ieeexplore.ieee.org
… a trust management scheme for pervasive computing. The aim of this scheme is to provide
a measure of trust among the devices in a pervasive computing … to compute the trust value: …

A trust-based security system for ubiquitous and pervasive computing environments

A Boukerche, Y Ren - Computer communications, 2008 - Elsevier
trust management that involves developing a trust model, assigning credentials to nodes,
updating private keys, managing the trust … formal security analysis of the trust system, we verify …

Developing a model for trust management in pervasive devices

F Almenarez, A Marín, D Díaz… - … on Pervasive Computing …, 2006 - ieeexplore.ieee.org
Trust is fundamental to establish communication with other users, because the identity is
often uncertain and on one’s own does not provide trust … a simple trust management model to …

A novel trust management scheme in pervasive computing

J Valarmathi, VR Uthariaraj, GA Kumar… - … Management and …, 2010 - ieeexplore.ieee.org
… as pervasive computing. When we design a trust management solution in pervasive computing,
one of the things we need to determine is the specific characteristics of trust in this field. …

A context-based trust management model for pervasive computing systems

N Razavi, AM Rahmani, M Mohsenzadeh - arXiv preprint arXiv:0911.0497, 2009 - arxiv.org
… CONCLUSION AND FUTURE WORKS In this paper, we proposed a trust management model
for pervasive computing systems based on the concept of context. We specified the details …

Privacy, trust and identity in pervasive computing: a review of technical challenges and future research directions

A Al-Karkhi, A Al-Yasiri, N Linge - arXiv preprint arXiv:1207.7242, 2012 - arxiv.org
manage issues like privacy, trust and identity in those environments. In this paper, we review
the technical challenges that face pervasive computingpervasive and traditional computing