Title | ||
---|---|---|
A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment |
Abstract | ||
---|---|---|
In ubiquitous computing traditional security mechanism is difficult to realize, as users do not have prior knowledge of each other and the availability of a trusted third party cannot be relied upon. Since trust is used as an elementary channel of interaction in a human society, a security model based on the real world characteristics of trust can provide the internal security before taking action, despite uncertainty and inadequate information in ubiquitous computing environment. We propose the trust based security architecture based on the human notion of trust as a mechanism to secure computing in ubiquitous environment. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1007/978-3-642-02617-1_71 | ISA |
Keywords | Field | DocType |
mathematical approach,pervasive computing environment,traditional security mechanism,human society,human notion,ubiquitous computing environment,ubiquitous computing,security model,security architecture,internal security,ubiquitous environment,elementary channel,secure computation,trusted third party,pervasive computing | Computer science,Computer security,Security service,Context-aware pervasive systems,End-user computing,Cloud computing security,Ubiquitous computing,Computational trust,Enterprise information security architecture,Computer security model | Conference |
Volume | ISSN | Citations |
5576 | 0302-9743 | 5 |
PageRank | References | Authors |
0.41 | 1 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Naima Iltaf | 1 | 42 | 7.64 |
Mukhtar Hussain | 2 | 23 | 5.32 |
Farrukh Kamran | 3 | 9 | 1.06 |