2009 IEEE International Conference on Pervasive Computing and Communications
Download PDF

Abstract

As pervasive systems become more prevalent, the need to protect these systems increases. In staying with the ideals of pervasive computing, we want to provide protection for these systems while remaining as unobtrusive to the user. It is seldom possible to guarantee the trustworthiness of users and resources. As a result, we devise systems designed to elicit the trustworthiness of users and resources and adapt access patterns based on this information. We present our mechanisms for determining trustworthiness and illustrates their suitability in pervasive systems through simulation results.
Like what you’re reading?
Already a member?Sign In
Member Price
$11
Non-Member Price
$21
Add to CartSign In
Get this article FREE with a new membership!

Related Articles