普及计算中的信任

J. Parker, A. Patwardhan, F. Perich, A. Joshi, Timothy W. Finin
{"title":"普及计算中的信任","authors":"J. Parker, A. Patwardhan, F. Perich, A. Joshi, Timothy W. Finin","doi":"10.1201/9781420013153.ch21","DOIUrl":null,"url":null,"abstract":"Pervasive environments are comprised of resource-constrained mobile devices ilimitedi in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.","PeriodicalId":205382,"journal":{"name":"The Handbook of Mobile Middleware","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Trust in Pervasive Computing\",\"authors\":\"J. Parker, A. Patwardhan, F. Perich, A. Joshi, Timothy W. Finin\",\"doi\":\"10.1201/9781420013153.ch21\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Pervasive environments are comprised of resource-constrained mobile devices ilimitedi in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.\",\"PeriodicalId\":205382,\"journal\":{\"name\":\"The Handbook of Mobile Middleware\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Handbook of Mobile Middleware\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/9781420013153.ch21\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Handbook of Mobile Middleware","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781420013153.ch21","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

普适环境由资源受限的移动设备组成,由于环境固有的动态性,它们与其他设备或网络的连接受到限制。由于与Internet的连接有限,无法使用传统的安全机制,如证书颁发机构和其他形式的以服务器为中心的身份验证。在这些情况下,点对点交互非常适合于信息交换。然而,保护移动设备、保护隐私、评估信任以及确定此类交互中对等提供的数据的可靠性和准确性的实际解决方案仍然缺乏。我们的研究旨在为信息和服务的可靠性和可信赖性提供更强的保证,并考虑在普遍环境下的实际实施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Trust in Pervasive Computing
Pervasive environments are comprised of resource-constrained mobile devices ilimitedi in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Mobile Middleware Mobile Middleware for Integration with Enterprise Applications IT-Based Open Service Delivery Platforms for Mobile Networks Integrated Profiling of Users, Terminals, and Provisioning Environments Trust in Pervasive Computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1