Trust model for mobile devices in ubiquitous environment

被引:0
|
作者
Jiang, Zhefan [1 ]
Kim, Sangwook [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Sci, Sankyuk Dong 1370, Taegu, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, anywhere. These mobile devices have restricted capabilities and security supports. Traditional security management systems used definite access control policies for each role or user in each domain server or agent. But in ubiquitous environment, it is hard to specify authorization policies for mobile users and it is inflexible and unavailable for security management of users or mobile devices. To solve these problems, we need trust-based management mechanism as a reference to security management systems. Trust model contains trust relationship and calculation of trust value. Experiences and recommendations are the factors to calculate trust value. In this paper, we design a trust model to calculate trust value and a trust management architecture which can be running in various domain servers and mobile devices.
引用
收藏
页码:426 / +
页数:3
相关论文
共 50 条
  • [1] A survey: Supporting mobile devices in a ubiquitous environment
    Bappu, B
    JOURNAL OF THE COMMUNICATIONS NETWORK, 2002, 1 : 36 - 42
  • [2] A Ubiquitous Integrated Development Environment for C Programming on Mobile Devices
    Liang, Tyng-Yeu
    Li, Hung-Fu
    Chen, Yu-Chih
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 184 - 189
  • [3] Mobile-PKI service model for ubiquitous environment
    Jeun, Inkyung
    Chun, Kilsoo
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 118 - 124
  • [4] User-centric multimedia information visualization for mobile devices in the ubiquitous environment
    Choi, Yoo-Joo
    Yoo, Seong Joon
    Choi, Soo-Mi
    Waldeck, Carsten
    Balfanz, Dirk
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2006, 4251 : 753 - 762
  • [5] A service oriented adaptive trust evaluation model for ubiquitous computing environment
    Jagadamba, G.
    Babu, B. Sathish
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2018, 29 (04) : 255 - 269
  • [6] Mobile Ubiquitous Network Environment
    Zhang Ping
    ZTE Communications, 2007, (01) : 54 - 59
  • [7] Mobile Ubiquitous Service Environment
    Zhang Ping
    ZTE Communications, 2007, (02) : 58 - 60
  • [8] TRULLO - local trust bootstrapping for ubiquitous devices
    Quercia, Daniele
    Hailes, Stephen
    Capra, Licia
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 211 - 219
  • [9] A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment
    Sheikh I. Ahamed
    Munirul M. Haque
    Nilothpal Talukder
    Telecommunication Systems, 2010, 44 : 221 - 240
  • [10] A formal context specific trust model (FTM) for multimedia and ubiquitous computing environment
    Ahamed, Sheikh I.
    Haque, Munirul M.
    Talukder, Nilothpal
    TELECOMMUNICATION SYSTEMS, 2010, 44 (3-4) : 221 - 240