Trustworthiness and Authentication in Ubiquitous Computing
Xiao, Hannan, Malcolm, James, Christianson, B. and Zhang, Y.
(2012)
Trustworthiness and Authentication in Ubiquitous Computing.
ACM Press.
In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approaches for implementing trustworthy authentication and related work are also presented.
Item Type | Other |
---|---|
Uncontrolled Keywords | ubiquitous computing; authentication; trust; trustworthiness; , trustworthy authentication |
Date Deposited | 14 Nov 2024 10:55 |
Last Modified | 14 Nov 2024 10:55 |