Pervasive Computing Secure Application Models Based on Trust Algorithm

被引:0
作者
Yong, Ting [1 ]
Qin, Jun [1 ]
Chen, Yanling [1 ]
Fang, Shanyao [1 ]
机构
[1] Inst North Elect Equipment, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012) | 2012年
关键词
component; secure application; trust; services;
D O I
10.1109/IMCCC.2012.149
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a secure application model based on trust algorithm, called T-SAM, designed to establish a reasonable secure application infrastructure, dynamically support comprehensive reasonable assessment for the trust level of services, choose out of secure services from the many services in order to achieve the uniform management and the security services of the application. T-SAM meets the end users individual application requirement, effectively inhibits the malicious service and constructs the complete secure application model based on trust algorithm.
引用
收藏
页码:606 / 609
页数:4
相关论文
共 5 条
[1]  
Johanson B., 2002, IEEE Pervasive Computing, V1, P67, DOI 10.1109/MPRV.2002.1012339
[2]  
Kindberg T., 2002, IEEE Pervasive Computing, V1, P70, DOI 10.1109/MPRV.2002.993146
[3]  
Ouzzani M, 2004, IEEE INTERNET COMPUT, V8, P34
[4]   Pervasive computing: Vision and challenges [J].
Satyanarayanan, M .
IEEE PERSONAL COMMUNICATIONS, 2001, 8 (04) :10-17
[5]  
Voida S., 2002, IEEE Pervasive Computing, V1, P73, DOI 10.1109/MPRV.2002.1037725