期刊文献+

普适计算中信任模型的研究 被引量:3

Research of Trust Model in Ubiquitous Computing
下载PDF
导出
摘要 首先概述了现有两种主要的信任模型以及其存在的问题,然后结合不确定概率理论和普适计算的特点,提出了普适环境下一种新的信任模型———基于属性凭证的信任模型。最后给出了它在实际中的应用。 Firstly reviews the two major recently-used trust model and their problems. Then with the knowledge of uncertain probabilities and character in ubiquitous computing, it presents the trust model based on the attribute credential, a new trust model in ubiquitous computing. Finally it puts forward an application of the new model.
出处 《计算机应用研究》 CSCD 北大核心 2006年第1期122-124,共3页 Application Research of Computers
基金 教育部科学技术研究重点项目(104086)
关键词 普适计算 属性凭证 信任模型 Ubiquitous Computing Attribute Credential Trust Model
  • 相关文献

参考文献18

  • 1D Saha, A Mukherjee. Pervasive Computing: A Paradigm for the 21 st Century [ J ]. Computer, 2003, 36(3): 25-31.
  • 2D Tennenhouse. Proactive computing [ J ]. Communications of the ACM, 2000, 43(5): 43-50.
  • 3G D Abowd, E D Mynatt. Charting Past, Present, and Future Research in Ubiquitous Computing[J]. ACM Transactions on Computer-Human Interaction, 2000, 7(1): 29-58.
  • 4F Stajano. Security for Ubiquitous Computing[ M ]. New York: Halsted Press, 2002. 56-96.
  • 5Anthony D Joseph. Security, Privacy, and Health [J]. IEEE Pervasive Computing, 2003, 2(1): 96-97.
  • 6M Weiser. Ubiquitous Computing[J]. IEEE Computer, 1993, 26(1): 71-72.
  • 7M Satyanarayanan. Pervasive Computing: Vision and Challenges[J].IEEE Personal Communications, 2001, 8(8): 10-17.
  • 8M Carnut, E Hora, C Mattos. FreeICP. ORG: Free Trusted Certificates by Combining the X. 509 and PGP Hierarchy Through a Collaborative Trust Scoring System [C]. Gaithersburg, USA: 2nd Annual PKI Research Workshop Proceedings, 2003. 13-29.
  • 9R Campbell, J Al-Muhtadi, P Naldurg,et al. Towards Security and Privacy for Pervasive Computing[C]. Japan: Tokyo, Proc. of International Symposium on Software Security, 2002. 8-10.
  • 10Robinson, Beigl. Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments [ C ]. Germany: Boppard,Prec, of the 1 st International Conference on Security in Pervasive Computing, 2003. 23-24.

同被引文献65

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部