2014
DOI: 10.1007/978-3-319-05218-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Trust Management in ULOOP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…In a pervasive scenario, the PDS system should rely on the possibility to build trust on-the-fly: devices create trust circles (i.e., sets of trusted users) based on the reputation of those with whom they interact, and based on the impact that those devices had on previous interactions. This way, users can establish communication with desirable trust levels and safely share data [6].…”
Section: Paradigm #2 -Trustworthy Peeringmentioning
confidence: 99%
See 2 more Smart Citations
“…In a pervasive scenario, the PDS system should rely on the possibility to build trust on-the-fly: devices create trust circles (i.e., sets of trusted users) based on the reputation of those with whom they interact, and based on the impact that those devices had on previous interactions. This way, users can establish communication with desirable trust levels and safely share data [6].…”
Section: Paradigm #2 -Trustworthy Peeringmentioning
confidence: 99%
“…One may argue that paradigm #1 is not required given the fact that users are expected (i.e., willing) to cooperate at all times. This assumption must be dealt with care: although devices have significant resources, their owners will certainly not share all the available resources [6].…”
Section: How To Design Pervasive Data Sharing Systemsmentioning
confidence: 99%
See 1 more Smart Citation