In this paper, we present a flexible, manageable, and configurable trust scheme for the security of pervasive computing applications. Our intention is to develop a trust framework capable of recognizing the difference between “pure” and “managed” ad hoc network structure, and capable of operating in either situation or a combination of both. Our trust framework will minimize the effects of malicious recommendations related to trust from other devices and have the capability to transfer security functionality from devices with limited computing resources to other secure and powerful devices. The presented framework allows administrators to customize trust-related settings in an effort to create a more secure and functional network. Within ou...
A significant characteristic of pervasive computing is the need for secure interactions between high...
A significant characteristic of pervasive computing is the need for secure interactions between high...
Abstract—Effective security mechanisms are essential to the widespread deployment of pervasive syste...
In this paper, we present a flexible, manageable, and configurable trust scheme for the security of ...
Recent years have witnessed the emergence and rapid growth of pervasive comput- ing technologies suc...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld dev...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
A significant characteristic of pervasive computing is the need for secure interactions between high...
Computing today is moving away from the desktop, becoming diffused into our surroundings and onto ou...
Recent developments in the fields of hand-held devices, wireless communications, and sensor networks...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital factor for...
A significant characteristic of pervasive computing is the need for secure interactions between high...
A significant characteristic of pervasive computing is the need for secure interactions between high...
Abstract—Effective security mechanisms are essential to the widespread deployment of pervasive syste...
In this paper, we present a flexible, manageable, and configurable trust scheme for the security of ...
Recent years have witnessed the emergence and rapid growth of pervasive comput- ing technologies suc...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Mutual collaboration plays a vital role in sharing of resources in an ad hoc network of handheld dev...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
A significant characteristic of pervasive computing is the need for secure interactions between high...
Computing today is moving away from the desktop, becoming diffused into our surroundings and onto ou...
Recent developments in the fields of hand-held devices, wireless communications, and sensor networks...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital factor for...
A significant characteristic of pervasive computing is the need for secure interactions between high...
A significant characteristic of pervasive computing is the need for secure interactions between high...
Abstract—Effective security mechanisms are essential to the widespread deployment of pervasive syste...