Abstract
As pervasive systems become more prevalent, the need to protect these systems increases. In staying with the ideals of pervasive computing, we want to provide protection for these systems while remaining as unobtrusive to the user. It is seldom possible to guarantee the trustworthiness of users and resources. As a result, we devise systems designed to elicit the trustworthiness of users and resources and adapt access patterns based on this information. We present our mechanisms for determining trustworthiness and illustrates their suitability in pervasive systems through simulation results.