Security, Privacy and Trust Issues in Smart Environments

Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser’s dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain.

[1]  Joan Feigenbaum,et al.  Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.

[2]  Roy H. Campbell,et al.  Towards Security and Privacy for Pervasive Computing , 2002, ISSS.

[3]  Ninghui Li,et al.  RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[4]  Joan Feigenbaum,et al.  Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.

[5]  Ghita Kouadri Mostéfaoui Security in Pervasive Environments, What's Next? , 2003, Security and Management.

[6]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[7]  Paddy Nixon,et al.  The SECURE collaboration model , 2003 .

[8]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[9]  Herman T. Tavani,et al.  Privacy protection, control of information, and privacy-enhancing technologies , 2001, CSOC.

[10]  Gerard Lacey,et al.  Managing Smart Environments , 2000 .

[11]  Boon Thau Loo,et al.  Trust Management , 2006, Lecture Notes in Computer Science.

[12]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[13]  Sotirios Terzis,et al.  Trust-based model for privacy control in context aware systems , 2003 .

[14]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[15]  Marianne Winslett,et al.  Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[16]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[17]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[18]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[19]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[20]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System Version 2 , 1999, RFC.

[21]  Catholijn M. Jonker,et al.  Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.

[22]  Alice Bob,et al.  The PGP Trust Model , 2005 .

[23]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[24]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[25]  Ninghui Li,et al.  Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..

[26]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[27]  J. Rubenfeld The Right of Privacy , 1989 .

[28]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[29]  Herman T. Tavani,et al.  Informational privacy, data mining, and the Internet , 1998, Ethics and Information Technology.

[30]  Markus Jakobsson,et al.  Security Weaknesses in Bluetooth , 2001, CT-RSA.

[31]  Fred D. Davis,et al.  TRUST FORMATION IN NEW ORGANIZATIONAL RELATIONSHIPS , 1996 .

[32]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[33]  Philip Robinson,et al.  Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments , 2003, SPC.

[34]  Tim Finin,et al.  A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .

[35]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[36]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.

[37]  Anup K. Ghosh,et al.  Software security and privacy risks in mobile e-commerce , 2001, CACM.

[38]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[39]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[40]  Gerard Lacey,et al.  Managing Interactions in Smart Environments , 2000, Springer London.