Advanced SIM Capabilities Supporting Trust-Based Applications

The SIM cards are going through several new enhancements both in the underlying hardware and its capabilities. They are becoming secure wireless networked devices containing embedded sensors. This paper assess how this new capabilities together with the pervasiveness and security of the SIM card can support the development and design of trust-based applications. Moreover, we present a specific use-case around a seamless trust builder for social networks, which makes use of sensed inputs towards building hard contextual evidences to trust relations. We conclude with the description of the challenges of building this evidence based trust-builder and the necessary steps to going from the prototype we developed to a real application which may accurately describe trust relations.

[1]  Nigel H. Lovell,et al.  Implementation of a real-time human movement classifier using a triaxial accelerometer for ambulatory monitoring , 2006, IEEE Transactions on Information Technology in Biomedicine.

[2]  E. Chang,et al.  Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence , 2006 .

[3]  John G. Breslin,et al.  The Future of Social Networks on the Internet: The Need for Semantics , 2007, IEEE Internet Computing.

[4]  Michael Tunstall Smart Card Security , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[5]  Ricardas Brazinskas Towards Context Awareness Using Mobile Sensors , 2008 .

[6]  Yarden Katz,et al.  Using Social Network-based Trust For Default Reasoning On The Web , 2006 .

[7]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[8]  Kristof Van Laerhoven,et al.  How to build smart appliances? , 2001, IEEE Personal Communications.

[9]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[10]  Ana Hristova Conceptualization and Design of a Context-Aware Platform for User-centric Applications , 2008 .

[11]  D. B. Davis,et al.  Sun Microsystems Inc. , 1993 .

[12]  Marc Renaudin,et al.  High security smartcards , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[13]  Jani Mäntyjärvi,et al.  Managing Context Information in Mobile Devices , 2003, IEEE Pervasive Comput..

[14]  Morteza Amini,et al.  Trust Inference in Web-Based Social Networks Using Resistive Networks , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[15]  Nadia Nedjah,et al.  Computational Intelligence in Information Assurance and Security , 2007, Studies in Computational Intelligence.

[16]  C. Meinel,et al.  Getting More from Reputation Systems: A Context–Aware Reputation Framework Based on Trust Centers and Agent Lists , 2008, 2008 The Third International Multi-Conference on Computing in the Global Information Technology (iccgi 2008).

[17]  Keith Mayes,et al.  On the potential of high density smart cards , 2006, Inf. Secur. Tech. Rep..