Providing a trustworthy mobile computing platform is crucial for mobile communications, services and applications. In this dissertation, we study methodologies and mechanisms that can be used to provide a trustworthy mobile computing platform. We also present an autonomic trust management solution for a component software middleware platform targeting at an embedded device, such as a mobile phone. In the first part of the dissertation, we firstly overview the literature background of trust modeling and trust management. We propose research methodologies on the basis of a conceptual architecture of a trusted mobile environment. Further, we present a methodology to bridge disjoint trusted domains in mobile computing and communications into a...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Recent years have witnessed the emergence and rapid growth of pervasive comput- ing technologies suc...
Providing a trustworthy mobile computing platform is crucial for mobile communications, services and...
Nowadays, users perform various essential activities through their smartphones, including mobile pay...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
Abstract — The capabilities of mobile devices are continuously increas-ing in processor speed, stora...
In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital factor for...
Using recent technologies such as Bluetooth, mobile users can share digital content (e.g., photos, v...
Some of the most significant security issues arising in the context of ubiquitous mobile computing a...
Currently, there is an increasing tendency to migrate the management of communications and informati...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-p...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Recent years have witnessed the emergence and rapid growth of pervasive comput- ing technologies suc...
Providing a trustworthy mobile computing platform is crucial for mobile communications, services and...
Nowadays, users perform various essential activities through their smartphones, including mobile pay...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
An era of computing is rapidly emerging where mobile agents autonomously retrieve and process inform...
Abstract — The capabilities of mobile devices are continuously increas-ing in processor speed, stora...
In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital factor for...
Using recent technologies such as Bluetooth, mobile users can share digital content (e.g., photos, v...
Some of the most significant security issues arising in the context of ubiquitous mobile computing a...
Currently, there is an increasing tendency to migrate the management of communications and informati...
We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by...
With emerging Internet-scale open content and resource sharing, social networks, and complex cyber-p...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
The rapid decrease in the size of mobile devices, coupled with an increase in capability, has enable...
Recent years have witnessed the emergence and rapid growth of pervasive comput- ing technologies suc...