2007 International Conference on Wireless Communications, Networking and Mobile Computing 2007
DOI: 10.1109/wicom.2007.554
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Framework for Pervasive Computing Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…Hence, a number of authentication frameworks and related access control schemes have been introduced, based on trust relations and privacy preservation among interacting entities [1,113,131]. Then, to cope with open, ad hoc interactions, proposed trust models and frameworks are based on context [114,134,137] or reputation [91]. In other cases, trust establishment needs to be performed through trust negotiation, which presents a threat to privacy due to the associated disclosure of sensitive information.…”
Section: Mobility Awareness and Adaptabilitymentioning
confidence: 99%
“…Hence, a number of authentication frameworks and related access control schemes have been introduced, based on trust relations and privacy preservation among interacting entities [1,113,131]. Then, to cope with open, ad hoc interactions, proposed trust models and frameworks are based on context [114,134,137] or reputation [91]. In other cases, trust establishment needs to be performed through trust negotiation, which presents a threat to privacy due to the associated disclosure of sensitive information.…”
Section: Mobility Awareness and Adaptabilitymentioning
confidence: 99%
“…Many solutions have been proposed to solve the issue. Xu et al [4] have proposed a trust framework for pervasive computing using statistical distribution. The framework is composed of three models, trust, security, and a risk model to resolve the uncertainty problem.…”
Section: Previous Workmentioning
confidence: 99%
“…Many researchers have been conducted in this field. The previous works used in different methods to achieve the objectives of the trust management system can be briefly summarized as: trust models based on Bayesian approach and probabilistic theory [3] [1,11], trust models based on, fuzzy logic [4,9]. Trust model based on Dempster-Shafer and theory of evidence [6], and some approaches based on game theory.…”
mentioning
confidence: 99%
“…Reference [8] discusses the differences and similarities between the concepts of trust in social networks and in computer networks. Two models, an entropy-based model and a probability-based model, are proposed to protect the devices in distributed networks from several typical attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Trust issues that devices face when communicating with each other in a pervasive computing environment are also pointed out in [2]. In [8], a user-centered trust network derived from an individual's social network is used to represent the degree of trust and ensure users' privacy in the pervasive computing environment. However, they do not provide the details of quantifying trust.…”
Section: Related Workmentioning
confidence: 99%