The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pervasive technologies are enabling an increasingly data-rich world that is mediated through a broad spectrum of often highly interdependent systems. The data science surrounding these systems is rapidly transforming nearly every aspect of our lives. But how trustworthy are the systems and data upon which we have come to rely? This article explores the complex collaborations and interdependencies...
We report on use of Active Privacy Bundles using a Trusted Third Party (APB-TTP) for protecting privacy of users' healthcare data (incl. patients' Electronic Health Records). APB-TTP protects data that are being disseminated among different authorized parties within a healthcare cloud. We are nearing completion of the pilot APB-TTP for healthcare applications, and commencing work on its extension,...
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So run time trustworthiness calculation would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors...
In this paper a generalized trust calculation mechanism is proposed which could be used to And out the trust values of various entities involved in a pervasive environment globally. The trust values calculated between the entities are stored in a global data store. This trust value can be used as a basis for future transactions of the entity concerned. The global data store can be maintained by a...
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to...
Mobile agent systems lack of security tools to grant access to their services to a wide range of users as open systems should do. A major issue is to prevent interactions with malicious entities. Trust concept from social science can help information systems to obtain solid social network of collaboration. We propose a flexible reputation framework with a centralized approach that manages trustworthiness...
The following topics were dealt with: security, privacy and trust; information and data management; Web and search; Web and services; P2P and grid; knowledge and machine leaning; wired and wireless networks; image and signal processing; distributed applications and performance evaluation; business applications and management; education and new technologies; pervasive computing and robotics.
Trust based access control models have recently attracted significant interest in the area of pervasive computing. In several trust based models, organizations are required to establish a set of trust beliefs regarding their neighboring nodes. In an organization there may be multiple administrators or the administrators may change with time. When multiple administrators contribute to the creation...
Privacy appears as a major issue for pervasive computing applications. Several models have been proposed to address privacy challenges. Successful design requires awareness of the technology's users and that their desires and concerns are understood. This is difficult as few empirical researches exist about potential pervasive users that designers can use. Complicating design further is the fact that...
Pervasive computing designers and researchers often create services and applications to help people record their experiences. At the same time, cheap, small, and easy-to-deploy recording technologies are quickly emerging throughout public spaces. In many ways, these technologies are pervasive computing realized. Understanding how people deal with audio and video recording is therefore a good way to...
The following topics are dealt with: security; privacy; trust; pervasive computing; ubiquitous computing; intrusion detection systems; authentication; and protocols.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.