메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1622-1628

Service sharing with trust in pervasive environment: Now it's time to break the jinx

Author keywords

Access control; Malicious recommendation; Student's t distribution; Trust model

Indexed keywords

ACCESS CONTROL; EVOLUTIONARY ALGORITHMS; RISK ASSESSMENT; RISK MANAGEMENT; SECURITY SYSTEMS;

EID: 56749177571     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1363686.1364070     Document Type: Conference Paper
Times cited : (5)

References (39)
  • 1
    • 56749137216 scopus 로고    scopus 로고
    • Philip Robinson, Harald Vogt, Waleed Wagealia: Some Research Challenges in Pervasive Computing, Book Chapter, p. 1-16, Privacy, Security and Trust within the Context of Pen'asive Computing, Springer, 2004.
    • Philip Robinson, Harald Vogt, Waleed Wagealia: "Some Research Challenges in Pervasive Computing," Book Chapter, p. 1-16, Privacy, Security and Trust within the Context of Pen'asive Computing, Springer, 2004.
  • 4
    • 56749147281 scopus 로고    scopus 로고
    • Nicholaos Michalakis, Location Aware Access Control for Pervasive Computing Environment, MIT Lab of Computer Science.
    • Nicholaos Michalakis, "Location Aware Access Control for Pervasive Computing Environment", MIT Lab of Computer Science.
  • 11
    • 33646801214 scopus 로고    scopus 로고
    • Markus C. Huebscher, Julie A. McCann, A Learning Model for Trustworthiness of Context-Awareness Services, percomw, pp. 120-124, Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05), 2005.
    • Markus C. Huebscher, Julie A. McCann, "A Learning Model for Trustworthiness of Context-Awareness Services," percomw, pp. 120-124, Third IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'05), 2005.
  • 12
    • 33846267322 scopus 로고    scopus 로고
    • Hassan Jameel, Le Xuan Hung, Umar Kalim, Ali Sajjad, Sungyoung Lee, and Young-Koo Lee, A trust model for ubiquitous systems based on vectors of trust values, In Seventh IEEE International Symposium on Multimedia, 12-14 Dec. 2005 Page(s):6 pp.
    • Hassan Jameel, Le Xuan Hung, Umar Kalim, Ali Sajjad, Sungyoung Lee, and Young-Koo Lee, "A trust model for ubiquitous systems based on vectors of trust values," In Seventh IEEE International Symposium on Multimedia, 12-14 Dec. 2005 Page(s):6 pp.
  • 13
    • 33745913622 scopus 로고    scopus 로고
    • B-trust: Bayesian Trust Framework for Pervasive Computing
    • iTrust, May, Pisa, Italy
    • D. Quercia, S. Hailes, and L. Capra, "B-trust: Bayesian Trust Framework for Pervasive Computing," iTrust. LNCS. May 2006. Pisa, Italy.
    • (2006) LNCS
    • Quercia, D.1    Hailes, S.2    Capra, L.3
  • 14
    • 33646827201 scopus 로고    scopus 로고
    • Ching Lin and Vijay Varadharajan, Trust enhanced security for mobile agents, In The Seventh IEEE International Conference on E-Commerce Technology CEC 2005, Page(s):231-238
    • Ching Lin and Vijay Varadharajan, "Trust enhanced security for mobile agents", In The Seventh IEEE International Conference on E-Commerce Technology CEC 2005, Page(s):231-238
  • 17
    • 56749094157 scopus 로고    scopus 로고
    • A. Josang and S. J. Knapskog. A metric for trusted systems. In Proceedings 21st NIST-NCSC National Information Systems Security Conference, pages 16-29, 98.
    • A. Josang and S. J. Knapskog. A metric for trusted systems. In Proceedings 21st NIST-NCSC National Information Systems Security Conference, pages 16-29, 98.
  • 18
    • 0035577649 scopus 로고    scopus 로고
    • L. Kagal, T. Finin, and A. Joshi. Trust-based security in pervasive computing environments. In IEEE Computer, 34, pages pp. 154-157, December 2001
    • L. Kagal, T. Finin, and A. Joshi. Trust-based security in pervasive computing environments. In IEEE Computer, volume 34, pages pp. 154-157, December 2001
  • 19
    • 0033903726 scopus 로고    scopus 로고
    • A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. In Proceedings 33th Hawaii International Conference on System Sciences. IEEE Press, January 2000.
    • A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. In Proceedings 33th Hawaii International Conference on System Sciences. IEEE Press, January 2000.
  • 24
    • 11244333253 scopus 로고    scopus 로고
    • J. Theodorakopoulos, G. Baras. Trust evaluation in ad-hoc networks. In WiSe '04: Proceedings of the 2004 ACM workshop on Wireless security, pages 1-10. ACM Press, 2004.
    • J. Theodorakopoulos, G. Baras. Trust evaluation in ad-hoc networks. In WiSe '04: Proceedings of the 2004 ACM workshop on Wireless security, pages 1-10. ACM Press, 2004.
  • 27
    • 33645958714 scopus 로고    scopus 로고
    • A Dynamic Trust Model for Pervasive Computing Environments
    • Las Vegas, NV, March 30-31
    • Daoxi Xiu and Zhaoyu Liu, "A Dynamic Trust Model for Pervasive Computing Environments", The Fourth Annual Security Conference, Las Vegas, NV, March 30-31, 2005.
    • (2005) The Fourth Annual Security Conference
    • Xiu, D.1    Liu, Z.2
  • 28
    • 78649710925 scopus 로고    scopus 로고
    • Brian Shand, Nathan Dimmock, Jean Bacon, Trust for Ubiquitous, Transparent Collaboration, percom, p. 153-160, First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003.
    • Brian Shand, Nathan Dimmock, Jean Bacon, "Trust for Ubiquitous, Transparent Collaboration," percom, p. 153-160, First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003.
  • 30
    • 56749126167 scopus 로고    scopus 로고
    • J. Basu and V. Callaghan, Towards a Trust Based Approach to Security and User Confidence in Pervasive Computing Systems, the IEE International Workshop, Intelligent Environments 2005 (IE05), UK, June 2005, Accessed May 2006, from http://cswww.essex.ac.uk/Research/iieg/papers/ Jisnu%20Basu%20IE05.pdf
    • J. Basu and V. Callaghan, "Towards a Trust Based Approach to Security and User Confidence in Pervasive Computing Systems," the IEE International Workshop, Intelligent Environments 2005 (IE05), UK, June 2005, Accessed May 2006, from http://cswww.essex.ac.uk/Research/iieg/papers/ Jisnu%20Basu%20IE05.pdf
  • 33
    • 9744278382 scopus 로고    scopus 로고
    • Rui He, Jianwei Niu, Man Yuan, Jianping Hu, A Novel Cloud-Based Trast Model for Pervasive Computing, cit, pp. 693-700, The Fourth International Conference on Computer and Information Technology (CIT04), 2004.
    • Rui He, Jianwei Niu, Man Yuan, Jianping Hu, "A Novel Cloud-Based Trast Model for Pervasive Computing," cit, pp. 693-700, The Fourth International Conference on Computer and Information Technology (CIT04), 2004.
  • 35
    • 37349052663 scopus 로고    scopus 로고
    • Muniral Haque, Sheikh I Ahamed, An Omnipresent Formal Trast Model (FTM) for Pervasive Computing Environment, Proceedings of the 31st Annual International Computer Software and Applications Conference COMPSAC 2007, IEEE CS Press, Beijing, China, July 23-27, pp. 49-56
    • Muniral Haque, Sheikh I Ahamed, "An Omnipresent Formal Trast Model (FTM) for Pervasive Computing Environment", Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), IEEE CS Press, Beijing, China, July 23-27, pp. 49-56.
  • 36
    • 0345399126 scopus 로고    scopus 로고
    • Student (W.S. Gosset) (1908) The probable error of a mean. Biometrika 6(1): 1-25
    • Student" (W.S. Gosset) (1908) The probable error of a mean. Biometrika 6(1): 1-25
  • 37
    • 56749088914 scopus 로고    scopus 로고
    • M. Abramowitz and I. A. Stegun, eds. (1972) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. New York: Dover. See Section 26.7
    • M. Abramowitz and I. A. Stegun, eds. (1972) Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. New York: Dover. (See Section 26.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.