The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So run time trustworthiness calculation would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors...
In this paper a generalized trust calculation mechanism is proposed which could be used to And out the trust values of various entities involved in a pervasive environment globally. The trust values calculated between the entities are stored in a global data store. This trust value can be used as a basis for future transactions of the entity concerned. The global data store can be maintained by a...
This paper is positioned around the notion that in an era of ubiquitous computing and digitalization of data, the Information Assurance in Security and Privacy (IASP) issues cannot be contained within geographic boundaries. Instead, they must be approached from a comparative cross-border perspective. Such a multi-dimensional inspection is even more critical because in the domain of electronic data...
The vision of data-centric security promises to enable efficient security in future ubiquitous computing environments, which are heavily pervaded with embedded devices and generally to complex to manage manually. We survey the existing work of various areas needed for data-centric security, point out their relationships, and comment on their applicability in these future environments. Furthermore,...
Industry, in parallel with a pervasive use of information and communication technologies, has begun in the last years to take into consideration the use of public information infrastructures (including the Internet) for remotely monitoring, managing and maintaining their technical systems. Concurrently, private and public networks are used for interconnecting technical and business information systems...
This paper builds on the authors' work on security challenges in the more general pervasive domain and considers what demands the adaptive paradigm will make of the information assurance community, and conversely, what information-assurance concerns should inform the realisation of pervasive adaptation. We propose a set of concepts which would enable these concerns to be addressed should they be adopted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.