Abstract
the date of receipt and acceptance should be inserted later
References (25)
- Langheinrich M. (2001) Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems. In: Proceeding of the 3rd International Conference on Ubiquitous Computing (UbiComp 2001), Springer-Velag LNCS 2201. pp. 273-291.
- Stajano F. (2002) Security for Ubiquitous Computing. In: Halsted Press.
- Martin Modahl, Bikash Agarwalla, T. Scott Saponas, Gregory Abowd and Umakishore Ramachandran (2006) UbiqStack: a taxonomy for a ubiquitous computing soft- ware stack. In: Personal and Ubiquitous Computing Jour- nal, Volume 10, Number 1, pp 21-27.
- Colin English, Sotirios Terzis and Paddy Nixon (2005) Towards self-protecting ubiquitous systems: monitoring trust-based interactions. In: Personal and Ubiquitous Computing Journal, Volume 10, Number 1, pp 50-54.
- Yin Shuxin, Ray Indrakshi (2006) A Trust Model for Per- vasive Computing Environments. In: International Con- ference on Collaborative Computing: Networking, Appli- cations and Worksharing.
- Taherian Mohsen, Jalili Rasool, Amini Morteza (2008) PTO: A Trust Ontology for Pervasive Environments. In: 22nd International Conference on Advanced Information Networking and Applications -Workshops, IEEE.
- Cheng Heng Seng, Zhang Daqing, Tan Joo Geok (2005) Protection of Privacy in Pervasive Computing Envi- ronments. In: Proceedings of the International Confer- ence on Information Technology: Coding and Computing (ITCC'05).
- Campbell R., Al-Muhtadi J. (2002) Towards Security and Privacy for Pervasive Computing. In: Proceedings of ISSS, Tokyo, Japan, 2002, pp 1-15.
- Tentori M., Favela J. (2005) Supporting Quality of Pri- vacy (QOP) in Pervasive Computing. In: Proceeding of the Sixth Mexican International Conference on Computer Science. ACM, 2005, Press, pp 58-67.
- Mihaela Ion , Andrea Danzi , Hristo Koshutanski and Luigi Telesca. (2007) A Peer-to-Peer Multidimensional Trust Model for Digital Ecosystems. Computer Science Department, University of Malaga, Spain.
- Yan Lindsay Sun, Wei Yu, Zhu Han, and K.J. Ray Liu. (2004) Information Theoretic Framework of Trust Model- ing and Evaluation for Ad Hoc Networks.
- Yonglin Ren and Azzedine Boukerche. (2008) Modeling and Managing the Trust for Wireless and Mobile Ad hoc Networks. In: ICC 2008 proceedings.
- Junhai Luo, Xue Liu, Mingyu Fan. (2009) A trust model based on fuzzy recommendation for mobile ad-hoc net- works. In: Computer Networks 53, pp 2396-2407.
- Judith Masthoff. (2007) Computationally Modelling Trust: An Exploration. University of Aberdeen, Aberdeen, Scotland, UK.
- Felix Gomez Marmol, Gregorio Martinez Pe rez. (2009) Security threats scenarios in trust and reputation models for distributed systems. Computers Security 28 (2009), pp 545-556 .
- Abi-Char Pierre, Mhamed A., El Hassan B. (2007) A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communica- tions. In: The International Conference on Next Genera- tion Mobile Applications, Services and Technologies (NG- MAST 2007).
- Moloney Maria, Weber Stefan. (2005) A Context-aware Trust-based Security System for Ad Hoc Networks. In: Workshop of the 1st International Conference on Secu- rity and Privacy for Emerging Areas in Communication Networks, 2005.
- Surie Ajay, Perrig Adrian, Farber David J. (2007) Rapid Trust Establishment for Pervasive Personal Computing. Published by the IEEE Computer Society. In: Pervasive Computing, IEEE, Volume 6 Issue 4, pp 24-30.
- Lagesse Brent, Kumar Mohan, Paluska Justin Mazzola, Wright Matthew (2009) DTT: A Distributed Trust Toolkit for Pervasive Systems. In: IEEE Conferences, 2009.
- Sheikh I. Ahamed, Moushumi Sharmin, Shameem Ahmed (2008) A Risk-aware Trust Based Secure Resource Discov- ery (RTSRD) Model for Pervasive Computing. In: Sixth Annual IEEE International Conference on Pervasive Com- puting and Communications. IEEE, 2008.
- Ghorbel M., Mhamed A., Mokhtari M. (2009) Secured and Trusted Service Provision in Pervasive Environment. In: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2009.
- Daniela Godoy and Anal Ãa Amandi (2011) Enabling topic-level trust for collaborative information sharing. In: Personal and Ubiquitous Computing Journal, OnlineFirst, 6 August 2011.
- A. El Husseini, A. Mhamed, B. El Hassan, M. Mokhtari (2011) A Novel Trust-Based Authentication Scheme for Low-Resource Devices in Smart Environments. In: The second International Conference on Ambient Systems, Networks and Technologies (ANT-2011).
- Borzymek, P. ; Sydow, M. ; Wierzbicki, A. (2009) Enrich- ing Trust Prediction Model in Social Network with User Rating Similarity. In: International Conference on Com- putational Aspects of Social Networks, 2009. CASON '09, pp 40-47.
- Yamasaki, S. (2011) A Trust Rating Method for Informa- tion Providers over the Social Web Service: A Pragmatic Protocol for Trust among Information Explorers and In- formation Providers. In: 11th International Symposium on Applications and the Internet (SAINT), 2011 IEEE/IPSJ, pp 578-582.