Abstract:
As pervasive systems become more prevalent, the need to protect these systems increases. In staying with the ideals of pervasive computing, we want to provide protection ...Show MoreMetadata
Abstract:
As pervasive systems become more prevalent, the need to protect these systems increases. In staying with the ideals of pervasive computing, we want to provide protection for these systems while remaining as unobtrusive to the user. It is seldom possible to guarantee the trustworthiness of users and resources. As a result, we devise systems designed to elicit the trustworthiness of users and resources and adapt access patterns based on this information. We present our mechanisms for determining trustworthiness and illustrates their suitability in pervasive systems through simulation results.
Date of Conference: 09-13 March 2009
Date Added to IEEE Xplore: 08 May 2009
CD:978-1-4244-3304-9