Trust, security and privacy for pervasive applications

被引:5
|
作者
Wang, Guojun [1 ]
Zhou, Wanlei [2 ]
Yang, Laurence T. [3 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
来源
JOURNAL OF SUPERCOMPUTING | 2013年 / 64卷 / 03期
关键词
D O I
10.1007/s11227-013-0953-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
April 2013 Special section of the Journal of Supercomputer reviews high quality research papers that report the latest research achievements in trust, security and privacy for pervasive applications. The first paper, 'A Holistic Approach Examining RFID Design for Security and Privacy,' presents a holistic approach to ensure security and privacy for Radio Frequency Identification (RFID) systems. The second paper, 'Secure Localization and Location Verification in Wireless Sensor Networks: A Survey,' presents a survey on secure localization and location verification in wireless networks. Another paper, 'Requirements and Design for Neutral Trust Management Framework in Unstructured Networks,' designs a neutral trust management framework for MANETs, to ensure that users could obtain services free from discrimination or interference. One more paper, 'User Requirements-Aware Security Ranking in SSL Protocol, proposes a secret exchange algorithm for the Secure Socket Layer (SSL) handshake protocol.
引用
收藏
页码:661 / 663
页数:3
相关论文
共 50 条
  • [1] Trust, security and privacy for pervasive applications
    Guojun Wang
    Wanlei Zhou
    Laurence T. Yang
    The Journal of Supercomputing, 2013, 64 : 661 - 663
  • [2] Special section on trust, security and privacy for pervasive applications
    Central South University, China
    不详
    不详
    IEICE Trans Inf Syst, 3 (409-410):
  • [3] Special Section on Trust, Security and Privacy for Pervasive Applications FOREWORD
    Wang, Guojun
    Yang, Laurence T.
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03) : 409 - 410
  • [4] Security and privacy information technologies and applications for wireless pervasive computing environments
    Wang, Shiuh-Jeng
    Liu, Jigang
    Shon, Taeshik
    Vaidya, Binod
    Chen, Yeong-Sheng
    INFORMATION SCIENCES, 2015, 321 : 147 - 149
  • [5] Towards security and privacy for pervasive computing
    Campbell, R
    Al-Muhtadi, J
    Naldurg, P
    Sampemane, G
    Mickunas, MD
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 1 - 15
  • [6] Security, Privacy, Confidentiality, and Trust in the Blockchain: From Theory to Applications
    Karpinski, Mikolaj
    Kuznetsov, Oleksandr
    Oliynykov, Roman
    ELECTRONICS, 2025, 14 (03):
  • [7] Datalog for Security, Privacy and Trust
    Bonatti, Piero A.
    DATALOG RELOADED: FIRST INTERNATIONALWORKSHOP, DATALOG 2010, 2011, 6702 : 21 - 36
  • [8] Security and Privacy Implications of Pervasive Memory Augmentation
    Davies, Nigel
    Friday, Adrian
    Clinch, Sarah
    Sas, Corina
    Langheinrich, Marc
    Ward, Geoff
    Schmidt, Albrecht
    IEEE PERVASIVE COMPUTING, 2015, 14 (01) : 44 - 53
  • [9] Pervasive Healthcare: Privacy and Security in Data Annotation
    Tonkin, Emma L.
    Yordanova, Kristina
    IEEE PERVASIVE COMPUTING, 2022, 21 (04) : 83 - 87
  • [10] SSRD+: A privacy-aware trust and security model for resource discovery in pervasive computing environment
    Sharmin, Moushumi
    Ahamed, Sheikh I.
    Ahmed, Shameem
    Li, Haifeng
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 67 - +