Reference Hub2
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems

An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems

Amr Ali-Eldin, Jan Van Den Berg, Semir Daskapan
Copyright: © 2014 |Volume: 8 |Issue: 4 |Pages: 18
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781466655027|DOI: 10.4018/IJISP.2014100103
Cite Article Cite Article

MLA

Ali-Eldin, Amr, et al. "An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems." IJISP vol.8, no.4 2014: pp.44-61. http://doi.org/10.4018/IJISP.2014100103

APA

Ali-Eldin, A., Van Den Berg, J., & Daskapan, S. (2014). An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems. International Journal of Information Security and Privacy (IJISP), 8(4), 44-61. http://doi.org/10.4018/IJISP.2014100103

Chicago

Ali-Eldin, Amr, Jan Van Den Berg, and Semir Daskapan. "An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems," International Journal of Information Security and Privacy (IJISP) 8, no.4: 44-61. http://doi.org/10.4018/IJISP.2014100103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

With the growing interest in ubiquitous applications, attention should be given to privacy and trust issues. Since these environments are quite dynamic, and interactive where devices possess low computing resources, new trust models are required that suit this environment and help overcome its limitations. In this paper, the authors explore the possibility to settle trust in an adaptive way prior to any information disclosure to enable adaptive privacy and security. The proposed model is simulated in a commercial cluster scenario where users can clear all their payments with their short-range ubiquitous devices. In this domain, the authors assume that the user has to rely on what they call payment disclosure service (PDS) to control his or her disclosure decisions. The proposed model respects the limitations of wireless devices such as limited connectivity and processing resources, while enabling autonomous and secure operations.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.