A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment

被引:0
作者
Iltaf, Naima [1 ]
Hussain, Mukhtar [1 ]
Kamran, Farrukh [2 ]
机构
[1] Mil Coll Signals NUST, Rawalpindi, Pakistan
[2] Ctr Adv Studies Engn, Islamabad, Pakistan
来源
ADVANCES IN INFORMATION SECURITY AND ASSURANCE | 2009年 / 5576卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In ubiquitous computing traditional security mechanism is difficult to realize, as users do not have prior knowledge of each other and the availability of a trusted third party cannot be relied upon. Since trust is used as an elementary channel of interaction in a human society, a security model based on the real world characteristics of trust can provide the internal security before taking action, despite uncertainty and inadequate information in ubiquitous computing environment. We propose the trust based security architecture based on the human notion of trust as a mechanism to secure computing in ubiquitous environment.
引用
收藏
页码:702 / +
页数:2
相关论文
共 6 条
  • [1] [Anonymous], 1988, TRUST MAKING BREAKIN
  • [2] BURT RS, 1999, DECAY FUNCTIONS
  • [3] Gray E., 2002, Towards a framework for assessing trust-based admission control in collaborative ad hoc applications
  • [4] GRAY WD, 1999, COGNATIVE MODELING H
  • [5] KAGAL L, 2002, G HOPPER CELEBRATION
  • [6] KAGAL L., 2001, IEEE Computer