2003
DOI: 10.1007/3-540-44875-6_10
|View full text |Cite
|
Sign up to set email alerts
|

Trusting Collaboration in Global Computing Systems

Abstract: Abstract. A significant characteristic of global computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover, these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2004
2004
2018
2018

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…Distributed communication is important to be achieved for MANET-based sensing and scrutiny applications. The communication will be effective only if all the nodes follow a trustworthy behaviour [1][2][3]. The MANETs is established in unconstrained environments with no centralized controlling authority, where the node compromising and attacks happen at higher probability.…”
Section: Related Workmentioning
confidence: 99%
“…Distributed communication is important to be achieved for MANET-based sensing and scrutiny applications. The communication will be effective only if all the nodes follow a trustworthy behaviour [1][2][3]. The MANETs is established in unconstrained environments with no centralized controlling authority, where the node compromising and attacks happen at higher probability.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research trend [4][5][6][7][8][9][10][11][12][13][17][18][19][20][21][22][23][24][25][26][27][28] is to build autonomous trust management as fundamental building block to design future security framework. SECURE project [4,5] presents a formal trust and risk framework to secure collaboration between ubiquitous computer systems. It demonstrates the aspects of the trust life cycle in three stages: trust formation, trust evolution and trust exploitation.…”
Section: Related Workmentioning
confidence: 99%
“…It is a human cognitive function that spurs social interactions. Recently, many researchers are working to imitate the way human assess trust, as a channel for socializing into our new security concepts for ubiquitous computing [4][5][6][7][8][9][10][11][12][13]. There emphasizes is on the computational capabilities, with less concern for systematically designed trust infrastructure resulting in ambiguous requirements for access control in ubiquitous environment.…”
Section: Introductionmentioning
confidence: 99%
“…The Secure Environments for Collaboration among Ubiquitous Roaming Entities (SECURE) project [3,5,6,7,8,9,10,17] is one of them. SECURE is a result of a comprehensive and ongoing work.…”
Section: Introductionmentioning
confidence: 99%
“…English et al propose an extension to the SECURE project [English et al, 2003]. Forming the premises for risk assessment and interaction/collaboration decisions, their architecture dynamically analyzes trust in three levels as formation, evolution and exploitation.…”
Section: Introductionmentioning
confidence: 99%