Trustworthiness and Authentication in Ubiquitous Computing

Xiao, Hannan, Malcolm, James, Christianson, B. and Zhang, Y. (2012) Trustworthiness and Authentication in Ubiquitous Computing. In: Procs 10th ACM Symposium on Mobility Management and Wireless Access :. ACM Press, pp. 135-138. ISBN 978-1-4503-1623-1
Copy

In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approaches for implementing trustworthy authentication and related work are also presented.

visibility_off picture_as_pdf

picture_as_pdf
XiaoMobiWAC2012.pdf
subject
Published Version
lock
Restricted to Registered users only

View Download Request Copy

Atom BibTeX OpenURL ContextObject in Span OpenURL ContextObject Dublin Core MPEG-21 DIDL Data Cite XML EndNote HTML Citation METS MODS RIOXX2 XML Reference Manager Refer ASCII Citation
Export

Downloads