Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 182 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
182
Dung lượng
2,59 MB
Nội dung
[...]... possible interfaces between context, trust, privacy and 1 The Influence ofContext on Privacy,Trust and Security The effect ofcontext is foreseeable when discussing the concerns of security and privacy The importance ofcontext stem from the fact that all its information are necessary to reach a useful decision in the face ofthe complexity environments ofpervasivecomputing These decisions are essentially... adjustment/self-tuning for privacy, trust, and security, in the sense that context information determines how much information could be revealed 14 PRIVACY,SECURITY,TRUST AND CONTEXT and to what degree/level entities will be trusted, and what types of security policies could be specified within specific context The influence ofcontext shows the need for defined interface in the domain ofpervasivecomputingThe discussion... gain an understanding ofthe relationships between context- awareness, privacy, security and trust, as these are the nuts and bolts that hold the societytechnology bridge in place By way of introduction, the publication begins with a brief overview ofthe State ofthe Art in Pervasive computing, in order that the motivations ofthe workshop are better understood The workshop’s themes and motivations... Identity The process of authentication (authentication techniques are totally different and varies in pervasive computing) involves collecting evidence about the identity of users The information of both trust and context are highly considered in the process of authentication, because they give an insight view into user’s identity The concerns of identity in pervasivecomputing are much bigger than in other... arguments for the conditions ofthe situation of any subject or target, which influences their interactive behaviour Privacy, security and trust may hence be representative of the rules that influence the interactive behaviour between a subject and a target, or the post-assertion of the validity of the interaction and resultant contextContext is therefore the knowledgebase that supports the reliable... much easier in comparison to the situations of no prior information This is why some of the proposed trust management systems incorporate solutions for uncertainty There are some other factors that influence greatly the establishment of trust, namely contextual information about the interaction, and privacy concerns The combination ofthetrust reasoning and other factors (context and privacy) will help... [1] These are all specializations ofthe model, depicted in figure 2, where the constituents of each layer may be configured to meet the particular requirements ofthe system environment Figure 2 Depiction of a PervasiveComputing Environment When considering context- awareness, privacy, security and trust, it is recognized that these have implications for and dependencies on each of these layers Context. .. in computingWithin these disciplines, trust is defined and treated from different angles that show its utilizations and applications Although, there is no consensus about a definition of trust, there is a general agreement on its properties as a subjective and elusive notion In these proceedings, contributions are concerned about the utilizations oftrust in pervasivecomputingThe application of trust. .. exploitation of trust, let’s consider the example of an interaction between the agents of two users (systems working on the users’ behalf) that will be carried out by using their PDAs Assume 12 PRIVACY,SECURITY,TRUST AND CONTEXT that agent A wants to share or to get access to B’s resources or stored data The first task for B is to reason about the trustworthiness of A This reasoning is mainly based on the. .. and systems Trust expresses the level of access to resources that can be granted based on the available information and evidence Trust information is mandatory for reaching decisions For trust management to be effective, the contextualization oftrust is an important step to build an appropriate level oftrust on others Trust management combines the notion of specifying security policy with the mechanisms . Privacy, Security and Trust within the Context of Pervasive Computing THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE Privacy, Security and Trust within the Context of Pervasive . outline of the results of this workshop. 2. The State of the Art in Pervasive Computing The term Pervasive Computing emerged from research at IBM dur- ing 1996 - 97, embracing the vision of computing. trusting the context as opposed to trusting a person or thing. The assurance of security within a context has then been identified as a prop- erty in the function of trusting the context. Furthermore,