2009 International Conference for Technical Postgraduates (TECHPOS) 2009
DOI: 10.1109/techpos.2009.5412053
|View full text |Cite
|
Sign up to set email alerts
|

A study of trust & privacy models in pervasive computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…The attacker is assumed to call TPM (vTPM) commands without bounds and without knowing the TPM (vTPM) root key, expecting to obtain or replace the user key. The analysis goal in TPM (vTPM) study is to guarantee the corresponding property of IDP, the user, RP execution, and the integrity of them [ 21 , 23 ]. Also, the overall aim of the proposed model is verifying the TA.…”
Section: Test and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…The attacker is assumed to call TPM (vTPM) commands without bounds and without knowing the TPM (vTPM) root key, expecting to obtain or replace the user key. The analysis goal in TPM (vTPM) study is to guarantee the corresponding property of IDP, the user, RP execution, and the integrity of them [ 21 , 23 ]. Also, the overall aim of the proposed model is verifying the TA.…”
Section: Test and Evaluationmentioning
confidence: 99%
“…Urien in [ 20 ] illustrated strong authentication (without password) for OpenID, according to a plug and play paradigm, based on SSL smart cards against Phishing attack. Khiabani et al in [ 21 ] discovered previous trust and privacy models in pervasive systems and analyzed them to highlight the importance of trusted computing platforms in tackling their weaknesses.…”
Section: Introductionmentioning
confidence: 99%
“…The attacker is assumed to call TPM (vTPM) commands without bounds and without knowing the TPM (vTPM) root key, expecting to obtain or replace the user key. The analysis goal in TPM (vTPM) study is to guarantee the corresponding property of IDP and the user [64,65]. Also, the overall aim of the proposed model is verifying the IMA.…”
Section: Compromising the Imamentioning
confidence: 99%
“…Khiabani et al [64] argue that pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly and in an unobtrusive manner even by unknown parties. Therefore, OpenID as a security activity would be a major issue in these environments.…”
Section: Authentication In An Untrustworthymentioning
confidence: 99%
“…So, before doing anything, the comprehending of this issue is necessary. We also need reliable methods to select service providers and resolve users' necessities, so in this way, we can help users for right decision making [3], [8], [9], [10]. on the other hand, it helps service providers to provide more applicable services and fulfill the requirements of users and present reliable services [11].This requires using models and frameworks to search proper and available services on cloud environments [12].So far, many selection measures for choosing service providers have been designed such as trust and reputation from different aspects [13].…”
Section: Introductionmentioning
confidence: 99%