The Handbook of Mobile Middleware
February 2, 2006
Pervasive environments are comprised of resource-constrained mobile devices “limited” in their connectivity to other devices or networks due to the inherent dynamic nature of the environment. Limited connectivity to the Internet precludes the use of conventional security mechanisms like Certifying Authorities and other forms of server-centric authentication. Under these circumstances peer-to-peer interactions are well-suited for information interchange. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust, and determining reliability and accuracy of peer-provided data in such interactions are still lacking. Our research is directed towards providing stronger assurances of reliability and trustworthiness of information and services with practical implementation considerations for pervasive environments.
Article
CRC Press
21
http://www.crcpress.com/product/isbn/9780849338335
Downloads: 2067 downloads
Google Scholar Citations: 1 citation
Bibtex Entry:
@Article{Trust_in_Pervasive_Computing, author = "Jim Parker, Anand Patwardhan, Filip Perich, Anupam Joshi, and Tim Finin", title = "{Trust in Pervasive Computing}", month = "February", year = "2006", chapter = "21", note = "http://www.crcpress.com/product/isbn/9780849338335", pages = "473-496", journal = "The Handbook of Mobile Middleware ", publisher = "CRC Press", }