scispace - formally typeset
Y

Yong Chen

Researcher at Trinity College, Dublin

Publications -  8
Citations -  637

Yong Chen is an academic researcher from Trinity College, Dublin. The author has contributed to research in topics: Ubiquitous computing & Trust management (information system). The author has an hindex of 7, co-authored 8 publications receiving 626 citations.

Papers
More filters
Journal ArticleDOI

Using trust for secure collaboration in uncertain environments

TL;DR: The SECURE project investigates the design of security mechanisms for pervasive computing based on trust, and addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.
Book ChapterDOI

Trust propagation in small worlds

TL;DR: This work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology.
Book ChapterDOI

End-to-End Trust Starts with Recognition

TL;DR: This paper argues for an entity recognition based approach to building this trust which differs from starting from more traditional authentication methods, and argues for the concept of a ”pluggable” recognition module which allows different recognition schemes to be used in different circumstances.

Towards security auto-configuration for smart appliances

TL;DR: The process of applying the SECURE project’s security technology to smart home appliances with minimal user intervention is outlined, which allows access rights to evolve among previously unknown principals, thus minimizing security configuration.
Journal ArticleDOI

Trust Evolution Policies for Security in Collaborative Ad Hoc Applications

TL;DR: An evaluation of policies specifying trust dynamics shows that the prototype reacts appropriately to the behaviour of other users and that the system updates trust values and implements admission policies in a manner similar to what would be expected from human trust assessment, indicating that trust evolution policies can replace explicit human intervention in application scenarios that are similar to the evaluated prototype.