메뉴 건너뛰기




Volumn , Issue , 2008, Pages 590-595

A Risk-aware Trust Based Secure Resource Discovery (RTSRD) model for pervasive computing

Author keywords

MARKS; Resource discovery; Risk model; Secure service and device discovery

Indexed keywords

AD HOC NETWORKS; CHLORINE COMPOUNDS; COMPUTER SYSTEMS; UBIQUITOUS COMPUTING;

EID: 49149084517     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOM.2008.113     Document Type: Conference Paper
Times cited : (7)

References (37)
  • 1
    • 84976653144 scopus 로고
    • Some Computer Science Problems in Ubiquitous Computing
    • July
    • M. Weiser, "Some Computer Science Problems in Ubiquitous Computing," Communications of the ACM, Vol. 36, No. 7, July 1993, pp. 75-84.
    • (1993) Communications of the ACM , vol.36 , Issue.7 , pp. 75-84
    • Weiser, M.1
  • 2
    • 49149111953 scopus 로고    scopus 로고
    • URL
    • Pervasive Computing definition, URL: http://www.parliament.vic.gov.au/ sarc/EDemocracy/Final_Report/Glossary.htm
    • Pervasive Computing definition
  • 3
    • 49149113467 scopus 로고    scopus 로고
    • URL
    • Pervasive Computing framework, URL: http://ftamework.v2.nl/archive/ archive/node/text/default.xslt/nodenr-156647
    • Pervasive Computing framework
  • 5
    • 0001853125 scopus 로고
    • The Computer for the Twenty-First Century
    • September
    • M. Weiser, "The Computer for the Twenty-First Century," Scientific American, September 1991, pp. 94-104.
    • (1991) Scientific American , pp. 94-104
    • Weiser, M.1
  • 6
    • 0010602271 scopus 로고    scopus 로고
    • System Software for Ubiquitous Computing
    • Jan-Mar
    • T. Kindberg and A. Fox, "System Software for Ubiquitous Computing," IEEE Pervasive Computing, Jan-Mar, 2002, pp. 70-81,
    • (2002) IEEE Pervasive Computing , pp. 70-81
    • Kindberg, T.1    Fox, A.2
  • 9
    • 0013413164 scopus 로고    scopus 로고
    • Security for Ubiquitous Computing
    • February
    • F. Stajano, "Security for Ubiquitous Computing," Wiley, February 2002, pp. 110-111.
    • (2002) Wiley , pp. 110-111
    • Stajano, F.1
  • 10
    • 0036999904 scopus 로고    scopus 로고
    • F. Stajano and R. Anderson, The Resurrecting Duckling: security issues for ubiquitous computing, Computer, 35(4), Part Supplement, April 2002, pp. 22-26.
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: security issues for ubiquitous computing," Computer, Vol. 35(4), Part Supplement, April 2002, pp. 22-26.
  • 12
    • 2642573748 scopus 로고    scopus 로고
    • Moving from Security to Distributed Trust in Ubiquitous Computing Environments
    • December
    • L. Kagal, T. Finin, and A. Joshi, "Moving from Security to Distributed Trust in Ubiquitous Computing Environments," IEEE Computer, December 2001.
    • (2001) IEEE Computer
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 14
    • 0035428326 scopus 로고    scopus 로고
    • Service Discovery in DEAPspace
    • August
    • M. Nidd, "Service Discovery in DEAPspace," IEEE Personal Communications, August 2001, pp. 39-45.
    • (2001) IEEE Personal Communications , pp. 39-45
    • Nidd, M.1
  • 15
    • 0035672220 scopus 로고    scopus 로고
    • Home Networking with Universal Plug and Play
    • December
    • B. A. Miller, T. Nixon, C. Tai, and M. D. Wood, "Home Networking with Universal Plug and Play", IEEE Communications Magazine, December 2001, Vol. 39, Issue 12, pp. 104-109.
    • (2001) IEEE Communications Magazine , vol.39 , Issue.12 , pp. 104-109
    • Miller, B.A.1    Nixon, T.2    Tai, C.3    Wood, M.D.4
  • 17
    • 84958951042 scopus 로고    scopus 로고
    • INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery
    • Zurich, Switzerland, August 26-28
    • M. Balazinska, H. Balakrishnan, and D. Karger, "INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery," International Conference on Pervasive Computing, Zurich, Switzerland, August 26-28, 2002, pp. 195-210.
    • (2002) International Conference on Pervasive Computing , pp. 195-210
    • Balazinska, M.1    Balakrishnan, H.2    Karger, D.3
  • 18
    • 49149112961 scopus 로고    scopus 로고
    • Microsoft Corporation, Universal Plug and Play Device Architecture, Version 1.0, Microsoft Co, 2000
    • Microsoft Corporation, "Universal Plug and Play Device Architecture," Version 1.0, Microsoft Co., 2000.
  • 20
    • 24744450314 scopus 로고    scopus 로고
    • F. Zhu, M. Mutka, and L. Ni, Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services, Pervasive Computing and Communications, 2003 (PerCom 2003), Proceedings of the First IEEE International Conference, 23-26 March 2003, pp. 235-242.
    • F. Zhu, M. Mutka, and L. Ni, "Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services," Pervasive Computing and Communications, 2003 (PerCom 2003), Proceedings of the First IEEE International Conference, 23-26 March 2003, pp. 235-242.
  • 26
    • 33750809662 scopus 로고    scopus 로고
    • MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability, and Self Healing) in Pervasive Computing Environments
    • NV, USA, April
    • M. Sharmin, S. Ahmed, and S. I. Ahamed, "MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability, and Self Healing) in Pervasive Computing Environments," Third International Conference on Information Technology: New Generations, NV, USA, April 2006, pp. 306-313.
    • (2006) Third International Conference on Information Technology: New Generations , pp. 306-313
    • Sharmin, M.1    Ahmed, S.2    Ahamed, S.I.3
  • 29
    • 33750351218 scopus 로고    scopus 로고
    • S. Ahmed, M. Sharmin, and S. I. Ahamed, PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business,29th International Computer Software and Applications Conference, Edinburgh, Scotland, July 2005, pp. 17-18
    • S. Ahmed, M. Sharmin, and S. I. Ahamed, "PerAd-Service: A Middleware Service for Pervasive Advertisement in M-Business,"29th International Computer Software and Applications Conference, Edinburgh, Scotland, July 2005, pp. 17-18.
  • 31
    • 36349010768 scopus 로고    scopus 로고
    • Classification of Service Discovery in Pervasive Computing Environments
    • MSU
    • F. Zhu, M. Mutka, and L. Ni, "Classification of Service Discovery in Pervasive Computing Environments," MSUCSE-02-24, MSU, 2002, pp. 1-17.
    • (2002) MSUCSE-02-24 , pp. 1-17
    • Zhu, F.1    Mutka, M.2    Ni, L.3
  • 35
    • 24744432052 scopus 로고    scopus 로고
    • SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments
    • Las Vegas, USA, April
    • M. Sharmin, S. Ahmed, and S. I. Ahamed, "SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) in Pervasive Computing Environments," IEEE international Conference on Information Technology (ITCC 2005), Las Vegas, USA, April 2005, pp. 271-276.
    • (2005) IEEE international Conference on Information Technology (ITCC 2005) , pp. 271-276
    • Sharmin, M.1    Ahmed, S.2    Ahamed, S.I.3
  • 37
    • 34247485438 scopus 로고    scopus 로고
    • M. Sharmin, S. Ahmed, and S. I. Ahamed, SSRD, A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment, Pro. of the 30th Annual International Computer Software and Applications Conference COMPSAC 2006, Chicago, September 17-21, 2006
    • M. Sharmin, S. Ahmed, and S. I. Ahamed, "SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment," Pro. of the 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, September 17-21, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.