scispace - formally typeset
P

Philip Robinson

Researcher at Karlsruhe Institute of Technology

Publications -  36
Citations -  705

Philip Robinson is an academic researcher from Karlsruhe Institute of Technology. The author has contributed to research in topics: Computer security model & Ubiquitous computing. The author has an hindex of 14, co-authored 36 publications receiving 654 citations. Previous affiliations of Philip Robinson include NTT DoCoMo.

Papers
More filters
Book ChapterDOI

PathTrust: a trust-based reputation service for virtual organization formation

TL;DR: A major contribution of this paper is an algorithm (called PathTrust) in this model that exploits the graph of relationships among the participants that strongly emphasizes the transitive model of trust in a web of trust.
Book ChapterDOI

AwareCon: Situation Aware Context Communication

TL;DR: In this article, the AwareCon network is proposed to address these challenges by prescribing an integrated architecture that differs from classical networking, as it features an awareness of the surrounding situation and context.

Smart-Its - communication and sensing technology for UbiComp environments

TL;DR: The architecture of the Smart-Its hardware, the design decisions for the hardware itself and experiences made while constructing and operating these devices are presented; some of these experience are also based on the deployment and use of the first 160 Smart-Her devices.
Book ChapterDOI

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments

TL;DR: The issue in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment and the solution presented requires an infrastructure of pervasive and context sensing technology to provide entity mapping, policy and trust management services.
Journal ArticleDOI

Security and Trust in IT Business Outsourcing: a Manifesto

TL;DR: The problem raises a number of related challenges such as: identification of metrics which are more suitable for security-level negotiation, client and contractor perspective and security guarantees in service composition scenarios.