Trust, security and privacy for pervasive applications

被引:5
|
作者
Wang, Guojun [1 ]
Zhou, Wanlei [2 ]
Yang, Laurence T. [3 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
来源
JOURNAL OF SUPERCOMPUTING | 2013年 / 64卷 / 03期
关键词
D O I
10.1007/s11227-013-0953-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
April 2013 Special section of the Journal of Supercomputer reviews high quality research papers that report the latest research achievements in trust, security and privacy for pervasive applications. The first paper, 'A Holistic Approach Examining RFID Design for Security and Privacy,' presents a holistic approach to ensure security and privacy for Radio Frequency Identification (RFID) systems. The second paper, 'Secure Localization and Location Verification in Wireless Sensor Networks: A Survey,' presents a survey on secure localization and location verification in wireless networks. Another paper, 'Requirements and Design for Neutral Trust Management Framework in Unstructured Networks,' designs a neutral trust management framework for MANETs, to ensure that users could obtain services free from discrimination or interference. One more paper, 'User Requirements-Aware Security Ranking in SSL Protocol, proposes a secret exchange algorithm for the Secure Socket Layer (SSL) handshake protocol.
引用
收藏
页码:661 / 663
页数:3
相关论文
共 50 条
  • [11] Trust and Security in pervasive networking - (pervasivetrust 2005)
    Rao, Sathya
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 300 - 301
  • [12] Trust based privacy protection method in pervasive computing
    Gao, Feng
    He, Jingsha
    Ma, Shunan
    Journal of Networks, 2012, 7 (02) : 322 - 328
  • [13] Privacy, Security and Trust in the Internet of Neurons
    Sempreboni, Diego
    Vigano, Luca
    SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2020, 2021, 12812 : 191 - 205
  • [14] Trust, privacy and security in digital business
    Katsikas, SK
    Lopez, J
    Pernul, G
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 391 - 399
  • [15] Security, Privacy, and Trust on Internet of Things
    Kolias, Constantinos
    Meng, Weizhi
    Kambourakis, Georgios
    Chen, Jiageng
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [16] Special issue of trust, security, and privacy for emerging applications in computer and information systems
    Wang, Guojun
    Al-Dubai, Ahmed Y.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 1975 - 1976
  • [17] Trust, Privacy and Security for Smart Cities
    Zhang, Yudong
    Chatterjee, Pushpita
    Mukherjee, Amrit
    SUSTAINABILITY, 2023, 15 (06)
  • [18] A Vision for Trust, Security and Privacy of Blockchain
    Wang, Wenshi
    SMART BLOCKCHAIN, 2018, 11373 : 93 - 98
  • [19] A Security, Privacy and Trust Methodology for IIoT
    Chen, Lifeng
    Ye, Zhixiao
    Jin, Shanyue
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2021, 28 (03): : 898 - 906
  • [20] User-controllable security and privacy for pervasive computing
    Cornwell, Jason
    Fette, Ian
    Hsieh, Gary
    Prabaker, Madhu
    Rao, Jinghai
    Tang, Karen
    Vaniea, Kami
    Bauer, Lujo
    Cranor, Lorrie
    Hong, Jason
    McLaren, Bruce
    Reiter, Mike
    Sadeh, Norman
    EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 14 - +