Paper
29 March 2004 A universal trust framework for pervasive computing
Rui He, Man Yuan, Hong Zhang, Jian Ma, Jianping Hu
Author Affiliations +
Proceedings Volume 5283, Mobile Service and Application; (2004) https://doi.org/10.1117/12.519924
Event: Asia-Pacific Optical and Wireless Communications, 2003, Wuhan, China
Abstract
Computing today is becoming pervasive. To provide pervasive computing environments flexible, dynamic and less distractive security mechanisms, trust managements are introduced. However, current trust frameworks are designed for specific scenarios and can’t fulfill requirements in different environments, which leads to that these trust frameworks can’t be deployed in different environments and pervasive devices can’t enjoy pervasive computing anywhere really. To remedy this problem, this paper proposes a universal trust framework. In our framework, the flexible attribute vector model is used to represent trust evidence that are needed to evaluate trust relationships, thus the framework can work in identity-based trust environments as well as context-based trust environments. Besides, the universal trust framework defines four kinds of trust relationships that are suitable o model trust relationships in various scenarios. In a word, the proposed universal trust framework is an especially designed trust framework that can unify trust management in different pervasive computing cases.
© (2004) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rui He, Man Yuan, Hong Zhang, Jian Ma, and Jianping Hu "A universal trust framework for pervasive computing", Proc. SPIE 5283, Mobile Service and Application, (29 March 2004); https://doi.org/10.1117/12.519924
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Personal digital assistants

Network security

Printing

Information security

Computer architecture

Internet

Databases

RELATED CONTENT

Protecting sensitive data: lessons learned
Proceedings of SPIE (March 12 1996)
Type enforcement: the new security model
Proceedings of SPIE (January 19 1996)
Bot armies as threats to network security
Proceedings of SPIE (April 09 2007)
End-to-end communications security
Proceedings of SPIE (April 18 2006)

Back to Top