Trustworthiness and Authentication in Ubiquitous Computing
Xiao, Hannan, Malcolm, James, Christianson, B. and Zhang, Y.
(2012)
Trustworthiness and Authentication in Ubiquitous Computing.
In:
Procs 10th ACM Symposium on Mobility Management and Wireless Access :.
ACM Press, pp. 135-138.
ISBN 978-1-4503-1623-1
In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approaches for implementing trustworthy authentication and related work are also presented.
Item Type | Book Section |
---|---|
Keywords | ubiquitous computing, authentication, trust, trustworthiness, , trustworthy authentication |
Date Deposited | 15 May 2025 16:30 |
Last Modified | 30 May 2025 23:13 |
Explore Further
-
picture_as_pdf - XiaoMobiWAC2012.pdf
-
subject - Published Version
-
lock - Restricted to Registered users only
Downloads