Ubiquitous Computing foresees a massively networked world supporting a population of diverse but cooperating mobile devices where trust relationships between entities are uncertain. Though there have been lots of effort fo-cusing on trust for Ubiquitous Systems, they did not at-tach enough importance to uncertainty in their model. On the other hand, most of the works draw a general picture without a detailed computational model. In this paper, we present a trust model based on the vectors of trust values of different entities. The evaluation of trust depends upon the recommendation of peer entities common to the interacting entities. These recommendations are weighted according to the number and time of past interactions. Furthermore we pre...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
INTRODUCTION In all computer systems, interactions between parties require the establishment of a l...
In the vision of ubiquitous computing, the activities of daily life are supported by a multitude of ...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
In order to ensure secure sharing of resources in an ad-hoc network of handheld devices in a multime...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
A significant characteristic of ubiquitous computing is the need for interactions of highly mobile e...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld dev...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Using recent technologies such as Bluetooth, mobile users can share digital content (e.g., photos, v...
This dissertation contributes to a relatively young field in computer science research, the field of...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
INTRODUCTION In all computer systems, interactions between parties require the establishment of a l...
In the vision of ubiquitous computing, the activities of daily life are supported by a multitude of ...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
In order to ensure secure sharing of resources in an ad-hoc network of handheld devices in a multime...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
A significant characteristic of ubiquitous computing is the need for interactions of highly mobile e...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld dev...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Using recent technologies such as Bluetooth, mobile users can share digital content (e.g., photos, v...
This dissertation contributes to a relatively young field in computer science research, the field of...
Abstract. In this paper, trust-based recommendations control the exchange of personal information be...
The notion of trust is presented as an important component in a security infrastructure for mobile a...
INTRODUCTION In all computer systems, interactions between parties require the establishment of a l...