scispace - formally typeset
Open AccessBook ChapterDOI

End-to-End Trust Starts with Recognition

TLDR
This paper argues for an entity recognition based approach to building this trust which differs from starting from more traditional authentication methods, and argues for the concept of a ”pluggable” recognition module which allows different recognition schemes to be used in different circumstances.
Abstract
Pervasive computing requires some level of trust to be established between entities. In this paper we argue for an entity recognition based approach to building this trust which differs from starting from more traditional authentication methods. We also argue for the concept of a ”pluggable” recognition module which allows different recognition schemes to be used in different circumstances. Finally, we propose that the trust in the underlying infrastructure has to be taken into account when considering end-to-end trust.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Using trust for secure collaboration in uncertain environments

TL;DR: The SECURE project investigates the design of security mechanisms for pervasive computing based on trust, and addresses how entities in unfamiliar pervasive computing environments can overcome initial suspicion to provide secure collaboration.
Book ChapterDOI

Trading privacy for trust

TL;DR: It is demonstrated how transactions made under different pseudonyms can be linked and careful disclosure of such links fulfils this right trade-off between trust and privacy by ensuring minimal trade of privacy for the required trust.
Journal ArticleDOI

Video security for ambient intelligence

TL;DR: A video security application for people detection, tracking, and counting in indoor environments is presented and may be employed to estimate the number of accesses in public buildings, as well as the preferred followed routes.
Journal ArticleDOI

Taxonomy of attacks and defense mechanisms in P2P reputation systems—Lessons for reputation system designers

TL;DR: A thorough view of the various credibility threats against a decentralized reputation system and the respective defense mechanisms and a roadmap for reputation system designers on how to use the results of the survey for the design of robust reputation systems for P2P applications are proposed.

Trust, Security and Privacy in Global Computing

TL;DR: This thesis sets up a framework, called entification, which encompasses both computational trust and identity aspects, and whose goal is to be applicable to global computing, and draws another parallel with human social networks, namely the notion of entity recognition (ER).
References
More filters
Book

The Evolution of Cooperation

TL;DR: In this paper, a model based on the concept of an evolutionarily stable strategy in the context of the Prisoner's Dilemma game was developed for cooperation in organisms, and the results of a computer tournament showed how cooperation based on reciprocity can get started in an asocial world, can thrive while interacting with a wide range of other strategies, and can resist invasion once fully established.
Journal ArticleDOI

The Computer for the 21st Century

Mark D. Weiser
- 01 Sep 1991 - 
TL;DR: Consider writing, perhaps the first information technology: The ability to capture a symbolic representation of spoken language for long-term storage freed information from the limits of individual memory.
Proceedings ArticleDOI

Decentralized trust management

TL;DR: This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.
Dissertation

Formalising Trust as a Computational Concept

Stephen Marsh
TL;DR: The thesis presents a testbed populated by simple trusting agents which substantiates the utility of the formalism and provides a step in the direction of a proper understanding and definition of human trust.
Book ChapterDOI

The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks

TL;DR: A resurrecting duckling security policy model is presented, which describes secure transient association of a device with multiple serialised owners over the air in a short range wireless channel.
Related Papers (5)