2008
DOI: 10.1098/rsta.2008.0134
|View full text |Cite
|
Sign up to set email alerts
|

Trust models in ubiquitous computing

Abstract: We recapture some of the arguments for trust-based technologies in ubiquitous computing, followed by a brief survey of some of the models of trust that have been introduced in this respect. Based on this, we argue for the need of more formal and foundational trust models.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 32 publications
(23 citation statements)
references
References 48 publications
0
23
0
Order By: Relevance
“…[14]) and is certainly desirable in general. However for some applications -specifically the C protocol -it is more reasonable to consider a simplified notion where trust in a user is common to everybody.…”
Section: C Protocol Extendedmentioning
confidence: 99%
See 1 more Smart Citation
“…[14]) and is certainly desirable in general. However for some applications -specifically the C protocol -it is more reasonable to consider a simplified notion where trust in a user is common to everybody.…”
Section: C Protocol Extendedmentioning
confidence: 99%
“…on Bayesian analysis (cf. [14]), whilst in the current centralised implementation of Crowds, observation leading to the estimation of t can be made by the mechanism which manages crowd membership, the so-called 'blender. ' We do not cover such issues and the related techniques in the current exposition, as we consider them largely orthogonal and scarcely relevant to the focus of this paper.…”
Section: Introductionmentioning
confidence: 99%
“…We refer to existing surveys [15,14,11] for a general introduction to reputation systems. It is interesting to notice that the reputation system associated with our calculus can be classified, according to [15], as a non-probabilistic experiencebased system, where principals are evaluated by inspecting their history, which is built by recording their past interaction with other principals.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Security is another vital aspect of the puzzle 24) , and trust has indeed been postulated as a potential aid in this environment 13) . However, rather than simply extend into the mobile space models of, for instance, webs of trust, and how to trust other people, we conjecture that a largely local approach to trust 'management' can produce interesting results because it can to some extent model and facilitate this bilateral relationship between device and user (how to trust the other person or other devices).…”
Section: Introductionmentioning
confidence: 99%