Security, privacy and trust of user-centric solutions

被引:12
|
作者
Akram, Raja Naeem [1 ]
Chen, Hsiao-Hwa [2 ]
Lopez, Javier [3 ]
Sauveron, Damien [4 ]
Yang, Laurence T. [5 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp Smart Card Ctr, Egham, Surrey, England
[2] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
[3] Univ Malaga, Comp Sci Dept, Ada Byron Bldg, Malaga 29071, Spain
[4] Univ Limoges, CNRS, XLIM, UMR 7252,MathIS, Limoges, France
[5] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS, Canada
基金
英国工程与自然科学研究理事会;
关键词
User-centric solutions; Security; Privacy; Trust; INTERNET; THINGS;
D O I
10.1016/j.future.2017.11.026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of pervasive and ubiquitous computing, of IoT and personal devices, user-centric solutions will be the paradigm for most of the future applications. In this context, user-centric solutions must be proposed from deployment models to the content management. Obviously suitable Security, Privacy and Trust (SPT) solutions have to be proposed to ensure the smooth operation of systems and their straightforward managements required for a successful mass-user adoption. In this paper, we summarize the literature related to user-centric SPT scenarios and present a selection of the most recent advances in these areas. (C) 2017 Published by Elsevier B.V.
引用
收藏
页码:417 / 420
页数:4
相关论文
共 50 条
  • [21] Trust management for user-centric identity management on the internet
    Choi, Daeseon
    Jin, Seung-Hun
    Yoon, Hyunsoo
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 367 - +
  • [22] Privacy-enhanced User-Centric Identity Management
    Ahn, Gail-Joon
    Ko, Moonam
    Shehab, Mohamed
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 998 - +
  • [23] Strategic Analysis of Trust Models for User-Centric Networks
    Kwiatkowska, Marta
    Parker, David
    Simaitis, Aistis
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2013, (112): : 53 - 59
  • [24] Development of a Security Application based on User-centric Evaluation
    Jeong, Jongmun
    Hwang, Mintae
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 225 - 228
  • [25] User-Centric Security Service Model for Cloud Storage
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryu, HoYong
    Ryou, JaeCheol
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 373 - 382
  • [26] Security and Performance Challenges for User-Centric Wireless Networking
    Frangoudis, Pantelis A.
    Polyzos, George C.
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (12) : 48 - 55
  • [27] Corporate security solutions for BYOD: A novel user-centric and self-adaptive system
    de las Cuevas, P.
    Mora, A. M.
    Merelo, J. J.
    Castillo, P. A.
    Garcia-Sanchez, P.
    Fernandez-Ares, A.
    COMPUTER COMMUNICATIONS, 2015, 68 : 83 - 95
  • [28] Realization of a user-centric, privacy preserving permission framework for Android
    Nauman, Mohammad
    Khan, Sohail
    Othman, Abu Talib
    Musa, Shahrulniza
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 368 - 382
  • [29] FOUGERE: User-Centric Location Privacy in Mobile Crowdsourcing Apps
    Meftah, Lakhdar
    Rouvoy, Romain
    Chrisment, Isabelle
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2019, 2019, 11534 : 116 - 132
  • [30] User-Centric Privacy for Identity Federations Based on a Recommendation System
    Villaran, Carlos
    Beltran, Marta
    ELECTRONICS, 2022, 11 (08)