Pervasive Trusted Computing

被引:1
|
作者
Balfe, Shane [1 ]
Li, Shiqun [2 ]
Zhou, Jianying [3 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, London NW1 4NS, England
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[3] Inst InfoComm Res, Singapore, Singapore
关键词
D O I
10.1109/SECPERU.2006.14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper will analyse the role Trusted Computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology of Weiser [32] and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual information as to their surroundings. While mindful of this invisibility property, we will examine Trusted Computing as a component of devices that themselves hold the promise of ubiquity. In this respect, we examine a contrived application scenario in order to abstract a number of useful properties Trusted Computing can provide in a pervasive setting.
引用
收藏
页码:88 / +
页数:2
相关论文
共 50 条
  • [1] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [2] Safeguarding personal data using trusted computing in pervasive computing
    Hohl, A
    Zugenmaier, A
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 147 - 155
  • [3] Secure pervasive computing without a Trusted Third Party
    Pirzada, AA
    McDonald, C
    IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2004, : 240 - 240
  • [4] A Study of Trust & Privacy Models in Pervasive Computing Approach to Trusted Computing Platforms
    Khiabani, Hamed
    Ab Manan, Jamalul-Lail
    Sidek, Zailani Mohamed
    2009 INTERNATIONAL CONFERENCE FOR TECHNICAL POSTGRADUATES (TECHPOS 2009), 2009, : 140 - +
  • [5] Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme
    Rathee, Geetanjali
    Iqbal, Razi
    Khelifi, Adel
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (02): : 2755 - 2769
  • [6] Information Hiding for Pervasive Trusted Authentication
    Liu, Wenjuan
    Fu, Xiufen
    Ouyang, Shaocong
    Lin, Jinchuan
    Teng, Shaohua
    JCPC: 2009 JOINT CONFERENCE ON PERVASIVE COMPUTING, 2009, : 653 - 656
  • [7] Pervasive computing
    不详
    IEEE MICRO, 1999, 19 (04) : 80 - 80
  • [8] Pervasive computing
    Akyildiz, I
    Rudin, H
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2001, 35 (04): : 371 - 371
  • [9] Pervasive Computing
    Pervasive Computing verändert unser Leben
    Behrendt, S., 1600, Swisscom (81):
  • [10] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414