Sciweavers

51 search results - page 1 / 11
» Rapid Trust Establishment for Pervasive Personal Computing
Sort
View
PERVASIVE
2007
Springer
13 years 4 months ago
Rapid Trust Establishment for Pervasive Personal Computing
Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan,...
SPC
2005
Springer
13 years 10 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...
PERCOM
2004
ACM
14 years 4 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
COMPSAC
2006
IEEE
13 years 10 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 5 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...