메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A study of trust & privacy models in pervasive computing approach to trusted computing platforms

Author keywords

Pervasive computing; Privacy; Trust; Trusted computing

Indexed keywords

DAILY LIVES; PERVASIVE COMPUTING; PERVASIVE DEVICES; PERVASIVE SYSTEMS; PRIVACY MODELS; TRUSTED COMPUTING; TRUSTED COMPUTING PLATFORM; USER INFORMATION;

EID: 77951021724     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TECHPOS.2009.5412053     Document Type: Conference Paper
Times cited : (3)

References (40)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • M. Weiser, "The computer for the 21st century," Scientific American, vol.265, 1991, pp. 75-166
    • (1991) Scientific American , vol.265 , pp. 75-166
    • Weiser, M.1
  • 4
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," Computer, vol.34, 2001, pp. 154-157.
    • (2001) Computer , vol.34 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 6
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design. - principles of privacy-aware ubiquitous systems
    • Atlanta, Georgia, USA: Springer-Verlag
    • M. Langheinrich, "Privacy by Design. - Principles of Privacy-Aware Ubiquitous Systems," Proceedings of the 3rd international conference on Ubiquitous Computing, Atlanta, Georgia, USA: Springer-Verlag, 2001, pp. 273-291.
    • (2001) Proceedings of the 3rd International Conference on Ubiquitous Computing , pp. 273-291
    • Langheinrich, M.1
  • 14
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • J. Sabater and C. Sierra, "Review on Computational Trust and Reputation Models," Artificial Intelligence Review, vol.24, 2005, pp. 33-60.
    • (2005) Artificial Intelligence Review , vol.24 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 16
    • 77950994810 scopus 로고    scopus 로고
    • "Trusted Computing Group," http://www.trustedcomputinggroup. org.
  • 17
    • 3142738238 scopus 로고    scopus 로고
    • Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Transactions on Knowledge and Data Engineering, vol.16, 2004, pp. 843-857.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 20
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path. independence
    • M.K. Reiter and S.G. Stubblebine, "Resilient Authentication Using Path. Independence," IEEE Transactions on Computers, vol.47, 1998, pp. 1351-1362.
    • (1998) IEEE Transactions on Computers , vol.47 , pp. 1351-1362
    • Reiter, M.K.1    Stubblebine, S.G.2
  • 22
    • 0013010709 scopus 로고    scopus 로고
    • Toward a generic model of trust for electronic commerce
    • Y. Tan and W. Thoen, "Toward a Generic Model of Trust for Electronic Commerce," International Journal of Electronic Commerce, vol.5, 2000, pp. 61-74.
    • (2000) International Journal of Electronic Commerce , vol.5 , pp. 61-74
    • Tan, Y.1    Thoen, W.2
  • 23
    • 33845924801 scopus 로고    scopus 로고
    • A multi-property trust model for reconfiguring component software
    • DOI 10.1109/QSIC.2005.5, 1579130, Proceedings - Fifth International Conference on Quality Software, QSIC 2005
    • M. Zhou, H. Mei, and L. Zhang, "A Multi-Property Trust Model for Reconfiguring Component Software," Proceedings of the Fifth International Conference on Quality Software, IEEE Computer Society, 2005, pp. 142-149. (Pubitemid 46442553)
    • (2005) Proceedings - International Conference on Quality Software , vol.2005 , pp. 142-149
    • Zhou, M.1    Mei, H.2    Zhang, L.3
  • 24
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Y.L. Sun, W. Yu, Z. Han, and K. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol.24, 2006, pp. 305-317.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.4
  • 25
    • 33750076651 scopus 로고    scopus 로고
    • Autonomic trust management in a component based software system
    • Springer Berlin / Heidelberg
    • Z. Yan and R. MacLaverty, "Autonomic Trust Management in a Component Based Software System," Autonomic and Trusted Computing, Springer Berlin / Heidelberg, 2006, pp. 279-292.
    • (2006) Autonomic and Trusted Computing , pp. 279-292
    • Yan, Z.1    MacLaverty, R.2
  • 26
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • DOI 10.1109/JSAC.2005.861390
    • G. Theodorakopoulos and J.S. Baras, "On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks," IEEE Journal on Selected Areas in Communications, vol.24, 2006, pp. 318-328. (Pubitemid 43269752)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.S.2
  • 33
    • 38349006925 scopus 로고    scopus 로고
    • Simplified privacy controls for aggregated services -suspend and resume of personal data
    • M. Schunter and M. Waidner, "Simplified Privacy Controls for Aggregated Services -Suspend and Resume of Personal Data," Privacy Enhancing Technologies, 2007, pp. 218-232.
    • (2007) Privacy Enhancing Technologies , pp. 218-232
    • Schunter, M.1    Waidner, M.2
  • 34
    • 33845532776 scopus 로고    scopus 로고
    • A system for privacy-aware resource allocation and data processing in dynamic environments
    • S. Pearson and M. Casassa-Mont, "A System for Privacy-Aware Resource Allocation and Data Processing in Dynamic Environments," Security and Privacy in Dynamic Environments, 2006, pp. 471-482.
    • (2006) Security and Privacy in Dynamic Environments , pp. 471-482
    • Pearson, S.1    Casassa-Mont, M.2
  • 35
    • 80052579597 scopus 로고    scopus 로고
    • Security and privacy preserving data in eGovernment integration
    • C. Biancalana and F. Profiti, "Security and privacy preserving data in eGovernment integration," ESIIG2, 2008.
    • (2008) ESIIG2
    • Biancalana, C.1    Profiti, F.2
  • 40
    • 24944506569 scopus 로고    scopus 로고
    • Trusted computing: Strengths, weaknesses and further opportunities for enhancing privacy
    • S. Pearson, "Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy," Trust Management, 2005, pp. 305-320.
    • (2005) Trust Management , pp. 305-320
    • Pearson, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.