Trust model for mobile devices in ubiquitous environment

被引:0
作者
Jiang, Zhefan [1 ]
Kim, Sangwook [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Sci, Sankyuk Dong 1370, Taegu, South Korea
来源
NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS | 2007年 / 4658卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, anywhere. These mobile devices have restricted capabilities and security supports. Traditional security management systems used definite access control policies for each role or user in each domain server or agent. But in ubiquitous environment, it is hard to specify authorization policies for mobile users and it is inflexible and unavailable for security management of users or mobile devices. To solve these problems, we need trust-based management mechanism as a reference to security management systems. Trust model contains trust relationship and calculation of trust value. Experiences and recommendations are the factors to calculate trust value. In this paper, we design a trust model to calculate trust value and a trust management architecture which can be running in various domain servers and mobile devices.
引用
收藏
页码:426 / +
页数:3
相关论文
共 13 条
  • [1] ABDULRAHAMAN A, 1997, P WORKSH NEW SEC PAR
  • [2] ALMENAREZ F, 2006, P 4 IEEE C PERV COMP
  • [3] Gambetta D., 1988, TRUST MAKING BREAKIN, DOI [10.2307/2234217, DOI 10.2307/591021]
  • [4] Grandison T.W.A, 2003, Trust Management for Internet Applications
  • [5] JAMEEL H, 2005, P 7 IEEE INTS MULT I
  • [6] JOSANG A, 2006, DECISION SUPPORT SYS
  • [7] LIN C, 2005, P 2 INT C MOB TECHN
  • [8] MCKHIGHT D, 1996, MEANINGS TRUST
  • [9] RAY I, 2005, INT C INF SYST SEC
  • [10] SHI J, 2004, 18 INT FED INF PROC