Security, privacy and trust of user-centric solutions

被引:12
|
作者
Akram, Raja Naeem [1 ]
Chen, Hsiao-Hwa [2 ]
Lopez, Javier [3 ]
Sauveron, Damien [4 ]
Yang, Laurence T. [5 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp Smart Card Ctr, Egham, Surrey, England
[2] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
[3] Univ Malaga, Comp Sci Dept, Ada Byron Bldg, Malaga 29071, Spain
[4] Univ Limoges, CNRS, XLIM, UMR 7252,MathIS, Limoges, France
[5] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS, Canada
基金
英国工程与自然科学研究理事会;
关键词
User-centric solutions; Security; Privacy; Trust; INTERNET; THINGS;
D O I
10.1016/j.future.2017.11.026
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of pervasive and ubiquitous computing, of IoT and personal devices, user-centric solutions will be the paradigm for most of the future applications. In this context, user-centric solutions must be proposed from deployment models to the content management. Obviously suitable Security, Privacy and Trust (SPT) solutions have to be proposed to ensure the smooth operation of systems and their straightforward managements required for a successful mass-user adoption. In this paper, we summarize the literature related to user-centric SPT scenarios and present a selection of the most recent advances in these areas. (C) 2017 Published by Elsevier B.V.
引用
收藏
页码:417 / 420
页数:4
相关论文
共 50 条
  • [21] Privacy-enhanced User-Centric Identity Management
    Ahn, Gail-Joon
    Ko, Moonam
    Shehab, Mohamed
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 998 - +
  • [22] Trust management for user-centric identity management on the internet
    Choi, Daeseon
    Jin, Seung-Hun
    Yoon, Hyunsoo
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 367 - +
  • [23] Strategic Analysis of Trust Models for User-Centric Networks
    Kwiatkowska, Marta
    Parker, David
    Simaitis, Aistis
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2013, (112): : 53 - 59
  • [24] Development of a Security Application based on User-centric Evaluation
    Jeong, Jongmun
    Hwang, Mintae
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 225 - 228
  • [25] User-Centric Security Service Model for Cloud Storage
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryu, HoYong
    Ryou, JaeCheol
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 373 - 382
  • [26] Security and Performance Challenges for User-Centric Wireless Networking
    Frangoudis, Pantelis A.
    Polyzos, George C.
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (12) : 48 - 55
  • [27] Corporate security solutions for BYOD: A novel user-centric and self-adaptive system
    de las Cuevas, P.
    Mora, A. M.
    Merelo, J. J.
    Castillo, P. A.
    Garcia-Sanchez, P.
    Fernandez-Ares, A.
    COMPUTER COMMUNICATIONS, 2015, 68 : 83 - 95
  • [28] Information Security Risk Communication: A User-centric Approach
    Alohali, Manal
    Clarke, Nathan
    Furnell, Steven
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [29] User-Centric Security and Dependability in the Clouds-of-Clouds
    Lacoste, Marc
    Miettinen, Markus
    Neves, Nuno
    Ramos, Fernando M. V.
    Vukolic, Marko
    Charmet, Fabien
    Yaich, Reda
    Oborzynski, Krzysztof
    Vernekar, Gitesh
    Sousa, Paulo
    IEEE CLOUD COMPUTING, 2016, 3 (05): : 64 - 75
  • [30] Virtualized Security at the Network Edge: A User-Centric Approach
    Montero, Diego
    Yannuzzi, Marcelo
    Shaw, Adrian
    Jacquin, Ludovic
    Pastor, Antonio
    Serral-Gracia, Rene
    Lioy, Antonio
    Risso, Fulvio
    Basile, Cataldo
    Sassu, Roberto
    Nemirovsky, Mario
    Ciaccia, Francesco
    Georgiades, Michael
    Charalambides, Savvas
    Kuusijarvi, Jarkko
    Bosco, Francesca
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (04) : 176 - 186