2012
DOI: 10.5121/ijdps.2012.3318
|View full text |Cite
|
Sign up to set email alerts
|

Privacy, Trust and Identity in Pervasive Computing: A Review of Technical Challenges and Future Research Directions

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 36 publications
0
4
0
Order By: Relevance
“…The modern system must be able to identify them in network for pervasive data exchange. The process of user identification is done by re-authentication where every individual of group re authenticate himself before getting a new key [33,34]. Other models for identity management include entity recognition by pluggable recognition module [35] and Resurrecting Duckling model where a slave device pose to be a master device by transfer of imprinting key [36].…”
Section: Identity Managementmentioning
confidence: 99%
“…The modern system must be able to identify them in network for pervasive data exchange. The process of user identification is done by re-authentication where every individual of group re authenticate himself before getting a new key [33,34]. Other models for identity management include entity recognition by pluggable recognition module [35] and Resurrecting Duckling model where a slave device pose to be a master device by transfer of imprinting key [36].…”
Section: Identity Managementmentioning
confidence: 99%
“…Due to the dynamic character of the pervasive environment, the services in the computing environment constantly changes and takes the user's sensitive information to ensure privacy. Various distributed security methods are required to keep the uniform security policy over distributed components in the computing architecture (Al-Karkhi et al , 2012; Arfaoui et al , 2020).…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the security measure boundaries are very difficult to define it.To overcome this, trust is one of the most significant means to improve security which considered as a cornerstone for information privacy and security. The information privacy depends on the trust level between the information receivers and information owners [6][7][8].…”
Section: Introductionmentioning
confidence: 99%