1. Trang chủ
  2. » Công Nghệ Thông Tin

privacy, security, & trust within the context of pervasive computing

182 282 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 182
Dung lượng 2,59 MB

Nội dung

[...]... possible interfaces between context, trust, privacy and 1 The Influence of Context on Privacy, Trust and Security The effect of context is foreseeable when discussing the concerns of security and privacy The importance of context stem from the fact that all its information are necessary to reach a useful decision in the face of the complexity environments of pervasive computing These decisions are essentially... adjustment/self-tuning for privacy, trust, and security, in the sense that context information determines how much information could be revealed 14 PRIVACY, SECURITY, TRUST AND CONTEXT and to what degree/level entities will be trusted, and what types of security policies could be specified within specific context The influence of context shows the need for defined interface in the domain of pervasive computing The discussion... gain an understanding of the relationships between context- awareness, privacy, security and trust, as these are the nuts and bolts that hold the societytechnology bridge in place By way of introduction, the publication begins with a brief overview of the State of the Art in Pervasive computing, in order that the motivations of the workshop are better understood The workshop’s themes and motivations... Identity The process of authentication (authentication techniques are totally different and varies in pervasive computing) involves collecting evidence about the identity of users The information of both trust and context are highly considered in the process of authentication, because they give an insight view into user’s identity The concerns of identity in pervasive computing are much bigger than in other... arguments for the conditions of the situation of any subject or target, which influences their interactive behaviour Privacy, security and trust may hence be representative of the rules that influence the interactive behaviour between a subject and a target, or the post-assertion of the validity of the interaction and resultant context Context is therefore the knowledgebase that supports the reliable... much easier in comparison to the situations of no prior information This is why some of the proposed trust management systems incorporate solutions for uncertainty There are some other factors that influence greatly the establishment of trust, namely contextual information about the interaction, and privacy concerns The combination of the trust reasoning and other factors (context and privacy) will help... [1] These are all specializations of the model, depicted in figure 2, where the constituents of each layer may be configured to meet the particular requirements of the system environment Figure 2 Depiction of a Pervasive Computing Environment When considering context- awareness, privacy, security and trust, it is recognized that these have implications for and dependencies on each of these layers Context. .. in computing Within these disciplines, trust is defined and treated from different angles that show its utilizations and applications Although, there is no consensus about a definition of trust, there is a general agreement on its properties as a subjective and elusive notion In these proceedings, contributions are concerned about the utilizations of trust in pervasive computing The application of trust. .. exploitation of trust, let’s consider the example of an interaction between the agents of two users (systems working on the users’ behalf) that will be carried out by using their PDAs Assume 12 PRIVACY, SECURITY, TRUST AND CONTEXT that agent A wants to share or to get access to B’s resources or stored data The first task for B is to reason about the trustworthiness of A This reasoning is mainly based on the. .. and systems Trust expresses the level of access to resources that can be granted based on the available information and evidence Trust information is mandatory for reaching decisions For trust management to be effective, the contextualization of trust is an important step to build an appropriate level of trust on others Trust management combines the notion of specifying security policy with the mechanisms . Privacy, Security and Trust within the Context of Pervasive Computing THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE Privacy, Security and Trust within the Context of Pervasive . outline of the results of this workshop. 2. The State of the Art in Pervasive Computing The term Pervasive Computing emerged from research at IBM dur- ing 1996 - 97, embracing the vision of computing. trusting the context as opposed to trusting a person or thing. The assurance of security within a context has then been identified as a prop- erty in the function of trusting the context. Furthermore,

Ngày đăng: 25/03/2014, 12:01

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN