메뉴 건너뛰기




Volumn , Issue , 2010, Pages 831-835

Towards a unified trust model in pervasive systems

Author keywords

Formalization; Pervasive computing; TPM; Trust; Trustworthiness

Indexed keywords

DAILY LIVES; PERVASIVE COMPUTING; PERVASIVE DEVICES; PERVASIVE SYSTEMS; RESEARCH PLANS; RUNTIMES; TRUST FACTOR; TRUST MODELS; TRUSTED PLATFORM MODULE; UNIFIED TRUST; USER INFORMATION;

EID: 77954806248     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAINA.2010.144     Document Type: Conference Paper
Times cited : (10)

References (26)
  • 1
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • M. Weiser, "The computer for the 21st century" Scientific American, vol. 265, 1991, pp. 75-166
    • (1991) Scientific American , vol.265 , pp. 75-166
    • Weiser, M.1
  • 4
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," Computer, vol.34, 2001, pp. 154-157.
    • (2001) Computer , vol.34 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 6
    • 84945556728 scopus 로고    scopus 로고
    • Privacy by design-principles of privacy-aware ubiquitous systems
    • Atlanta, Georgia, USA: Springer-Verlag
    • M. Langheinrich, "Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems," Proceedings of the 3rd international conference on Ubiquitous Computing, Atlanta, Georgia, USA: Springer-Verlag, 2001, pp. 273-291.
    • (2001) Proceedings of the 3rd International Conference on Ubiquitous Computing , pp. 273-291
    • Langheinrich, M.1
  • 14
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • J. Sabater and C. Sierra, "Review on Computational Trust and Reputation Models," Artificial Intelligence Review, vol.24, 2005, pp. 33-60.
    • (2005) Artificial Intelligence Review , vol.24 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 16
    • 77954786437 scopus 로고    scopus 로고
    • Trusted Computing Group
    • "Trusted Computing Group," http://www.trustedcomputinggroup. org.
  • 17
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation-based trust for Peer-To-Peer electronic communities
    • L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Transactions on Knowledge and Data Engineering, vol.16, 2004, pp. 843-857.
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 20
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path independence
    • M.K. Reiter and S.G. Stubblebine, "Resilient Authentication Using Path Independence," IEEE Transactions on Computers, vol.47, 1998, pp. 1351-1362.
    • (1998) IEEE Transactions on Computers , vol.47 , pp. 1351-1362
    • Reiter, M.K.1    Stubblebine, S.G.2
  • 22
    • 0013010709 scopus 로고    scopus 로고
    • Toward a generic model of trust for electronic commerce
    • Y. Tan and W. Thoen, "Toward a Generic Model of Trust for Electronic Commerce," International Journal of Electronic Commerce, vol.5, 2000, pp. 61-74.
    • (2000) International Journal of Electronic Commerce , vol.5 , pp. 61-74
    • Tan, Y.1    Thoen, W.2
  • 23
    • 33845924801 scopus 로고    scopus 로고
    • A multi-property trust model for reconfiguring component software
    • DOI 10.1109/QSIC.2005.5, 1579130, Proceedings - Fifth International Conference on Quality Software, QSIC 2005
    • M. Zhou, H. Mei, and L. Zhang, "A Multi-Property Trust Model for Reconfiguring Component Software," Proceedings of the Fifth International Conference on Quality Software, IEEE Computer Society, 2005, pp. 142-149. (Pubitemid 46442553)
    • (2005) Proceedings - International Conference on Quality Software , vol.2005 , pp. 142-149
    • Zhou, M.1    Mei, H.2    Zhang, L.3
  • 24
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Y.L. Sun, W. Yu, Z. Han, and K. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol.24, 2006, pp. 305-317.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , pp. 305-317
    • Sun, Y.L.1    Yu, W.2    Han, Z.3    Liu, K.4
  • 25
    • 33750076651 scopus 로고    scopus 로고
    • Autonomic trust management in a component based software system
    • Springer Berlin / Heidelberg
    • Z. Yan and R. MacLaverty, "Autonomic Trust Management in a Component Based Software System," Autonomic and Trusted Computing, Springer Berlin / Heidelberg, 2006, pp. 279-292.
    • (2006) Autonomic and Trusted Computing , pp. 279-292
    • Yan, Z.1    MacLaverty, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.