Academia.eduAcademia.edu

Outline

As Major Factors to the Acceptance and the Success of

2013

https://doi.org/10.1007/S00779-012-0548-8

Abstract

the date of receipt and acceptance should be inserted later

References (25)

  1. Langheinrich M. (2001) Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems. In: Proceeding of the 3rd International Conference on Ubiquitous Computing (UbiComp 2001), Springer-Velag LNCS 2201. pp. 273-291.
  2. Stajano F. (2002) Security for Ubiquitous Computing. In: Halsted Press.
  3. Martin Modahl, Bikash Agarwalla, T. Scott Saponas, Gregory Abowd and Umakishore Ramachandran (2006) UbiqStack: a taxonomy for a ubiquitous computing soft- ware stack. In: Personal and Ubiquitous Computing Jour- nal, Volume 10, Number 1, pp 21-27.
  4. Colin English, Sotirios Terzis and Paddy Nixon (2005) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. In: Personal and Ubiquitous Computing Journal, Volume 10, Number 1, pp 50-54.
  5. Yin Shuxin, Ray Indrakshi (2006) A Trust Model for Per- vasive Computing Environments. In: International Con- ference on Collaborative Computing: Networking, Appli- cations and Worksharing.
  6. Taherian Mohsen, Jalili Rasool, Amini Morteza (2008) PTO: A Trust Ontology for Pervasive Environments. In: 22nd International Conference on Advanced Information Networking and Applications -Workshops, IEEE.
  7. Cheng Heng Seng, Zhang Daqing, Tan Joo Geok (2005) Protection of Privacy in Pervasive Computing Envi- ronments. In: Proceedings of the International Confer- ence on Information Technology: Coding and Computing (ITCC'05).
  8. Campbell R., Al-Muhtadi J. (2002) Towards Security and Privacy for Pervasive Computing. In: Proceedings of ISSS, Tokyo, Japan, 2002, pp 1-15.
  9. Tentori M., Favela J. (2005) Supporting Quality of Pri- vacy (QOP) in Pervasive Computing. In: Proceeding of the Sixth Mexican International Conference on Computer Science. ACM, 2005, Press, pp 58-67.
  10. Mihaela Ion , Andrea Danzi , Hristo Koshutanski and Luigi Telesca. (2007) A Peer-to-Peer Multidimensional Trust Model for Digital Ecosystems. Computer Science Department, University of Malaga, Spain.
  11. Yan Lindsay Sun, Wei Yu, Zhu Han, and K.J. Ray Liu. (2004) Information Theoretic Framework of Trust Model- ing and Evaluation for Ad Hoc Networks.
  12. Yonglin Ren and Azzedine Boukerche. (2008) Modeling and Managing the Trust for Wireless and Mobile Ad hoc Networks. In: ICC 2008 proceedings.
  13. Junhai Luo, Xue Liu, Mingyu Fan. (2009) A trust model based on fuzzy recommendation for mobile ad-hoc net- works. In: Computer Networks 53, pp 2396-2407.
  14. Judith Masthoff. (2007) Computationally Modelling Trust: An Exploration. University of Aberdeen, Aberdeen, Scotland, UK.
  15. Felix Gomez Marmol, Gregorio Martinez Pe rez. (2009) Security threats scenarios in trust and reputation models for distributed systems. Computers Security 28 (2009), pp 545-556 .
  16. Abi-Char Pierre, Mhamed A., El Hassan B. (2007) A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communica- tions. In: The International Conference on Next Genera- tion Mobile Applications, Services and Technologies (NG- MAST 2007).
  17. Moloney Maria, Weber Stefan. (2005) A Context-aware Trust-based Security System for Ad Hoc Networks. In: Workshop of the 1st International Conference on Secu- rity and Privacy for Emerging Areas in Communication Networks, 2005.
  18. Surie Ajay, Perrig Adrian, Farber David J. (2007) Rapid Trust Establishment for Pervasive Personal Computing. Published by the IEEE Computer Society. In: Pervasive Computing, IEEE, Volume 6 Issue 4, pp 24-30.
  19. Lagesse Brent, Kumar Mohan, Paluska Justin Mazzola, Wright Matthew (2009) DTT: A Distributed Trust Toolkit for Pervasive Systems. In: IEEE Conferences, 2009.
  20. Sheikh I. Ahamed, Moushumi Sharmin, Shameem Ahmed (2008) A Risk-aware Trust Based Secure Resource Discov- ery (RTSRD) Model for Pervasive Computing. In: Sixth Annual IEEE International Conference on Pervasive Com- puting and Communications. IEEE, 2008.
  21. Ghorbel M., Mhamed A., Mokhtari M. (2009) Secured and Trusted Service Provision in Pervasive Environment. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2009.
  22. Daniela Godoy and Anal Ãa Amandi (2011) Enabling topic-level trust for collaborative information sharing. In: Personal and Ubiquitous Computing Journal, OnlineFirst, 6 August 2011.
  23. A. El Husseini, A. Mhamed, B. El Hassan, M. Mokhtari (2011) A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments. In: The second International Conference on Ambient Systems, Networks and Technologies (ANT-2011).
  24. Borzymek, P. ; Sydow, M. ; Wierzbicki, A. (2009) Enrich- ing Trust Prediction Model in Social Network with User Rating Similarity. In: International Conference on Com- putational Aspects of Social Networks, 2009. CASON '09, pp 40-47.
  25. Yamasaki, S. (2011) A Trust Rating Method for Informa- tion Providers over the Social Web Service: A Pragmatic Protocol for Trust among Information Explorers and In- formation Providers. In: 11th International Symposium on Applications and the Internet (SAINT), 2011 IEEE/IPSJ, pp 578-582.