P
Philip Robinson
Researcher at Karlsruhe Institute of Technology
Publications - 36
Citations - 705
Philip Robinson is an academic researcher from Karlsruhe Institute of Technology. The author has contributed to research in topics: Computer security model & Ubiquitous computing. The author has an hindex of 14, co-authored 36 publications receiving 654 citations. Previous affiliations of Philip Robinson include NTT DoCoMo.
Papers
More filters
Book ChapterDOI
PathTrust: a trust-based reputation service for virtual organization formation
TL;DR: A major contribution of this paper is an algorithm (called PathTrust) in this model that exploits the graph of relationships among the participants that strongly emphasizes the transitive model of trust in a web of trust.
Book ChapterDOI
AwareCon: Situation Aware Context Communication
TL;DR: In this article, the AwareCon network is proposed to address these challenges by prescribing an integrated architecture that differs from classical networking, as it features an awareness of the surrounding situation and context.
Smart-Its - communication and sensing technology for UbiComp environments
TL;DR: The architecture of the Smart-Its hardware, the design decisions for the hardware itself and experiences made while constructing and operating these devices are presented; some of these experience are also based on the deployment and use of the first 160 Smart-Her devices.
Book ChapterDOI
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
Philip Robinson,Michael Beigl +1 more
TL;DR: The issue in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment and the solution presented requires an infrastructure of pervasive and context sensing technology to provide entity mapping, policy and trust management services.
Journal ArticleDOI
Security and Trust in IT Business Outsourcing: a Manifesto
TL;DR: The problem raises a number of related challenges such as: identification of metrics which are more suitable for security-level negotiation, client and contractor perspective and security guarantees in service composition scenarios.