Establishing trust with privacy

被引:0
|
作者
Bussard, Laurent [1 ]
Molva, Refik [1 ]
机构
[1] Inst Eurecom, Corp Commun 2229, F-06904 Sophia Antipolis, France
来源
SECURITY PROTOCOLS | 2006年 / 3957卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In pervasive computing environments, a priori trust among parties is lacking. New mechanisms are required in order to build trust without relying on existing relationships. We present a solution to establish trust based on a history of previous interactions among parties. Past interactions can be proven while assuring the untraceability and anonymity of provers.
引用
收藏
页码:199 / 212
页数:14
相关论文
共 50 条
  • [31] Privacy and trust in the information society
    van Rooy, Dirk
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 51 - 53
  • [32] Privacy and trust in distributed networks
    Rössler, T
    Hollosi, A
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 117 - 131
  • [33] Trust and Privacy in Process Analytics
    Mannhardt, Felix
    Koschmider, Agnes
    Biermann, Lars
    Lange, Jana
    Tschorsch, Florian
    Wynn, Moe
    ENTERPRISE MODELLING AND INFORMATION SYSTEMS ARCHITECTURES-AN INTERNATIONAL JOURNAL, 2020, 15
  • [34] Trust and Privacy in Dissemination Control
    Ye, Xiaojun
    Li, Zude
    Li, Bin
    Xie, Feng
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 173 - +
  • [35] To Trust or Not-Trust: Privacy Issues With Voice Assistants
    Pal, Debajyoti
    Arpnikanondt, Chonlameth
    Razzaque, Mohammad Abdur
    Funilkul, Suree
    IT PROFESSIONAL, 2020, 22 (05) : 46 - 53
  • [36] Establishing Trust in the Emerging Era of IoT
    Sato, Hiroyuki
    Kanai, Atsushi
    Tanimoto, Shigeaki
    Kobayashi, Toru
    PROCEEDINGS 2016 IEEE SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING SOSE 2016, 2016, : 398 - 406
  • [37] Establishing and Evaluating Trust in a Grid Environment
    Bhanwar, Shashi
    Bawa, Seema
    2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 674 - 678
  • [38] A framework for establishing trust in Cloud provenance
    Abbadi, Imad M.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (02) : 111 - 128
  • [39] Establishing trust in mobile cloud computing
    School of Computer Science and Technology, Xi’an University of Posts and Telecommunications, Weiguo Road, Chang’an District
    Xi���an, China
    ICIC Express Lett., 6 (1713-1718):
  • [40] Establishing and Maintaining Trust in a Mobile Device
    Carver, Kristopher
    Sritapan, Vincent
    Corbett, Cherita
    IT PROFESSIONAL, 2015, 17 (06) : 66 - 68