Trust, security and privacy for pervasive applications

被引:5
|
作者
Wang, Guojun [1 ]
Zhou, Wanlei [2 ]
Yang, Laurence T. [3 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
来源
JOURNAL OF SUPERCOMPUTING | 2013年 / 64卷 / 03期
关键词
D O I
10.1007/s11227-013-0953-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
April 2013 Special section of the Journal of Supercomputer reviews high quality research papers that report the latest research achievements in trust, security and privacy for pervasive applications. The first paper, 'A Holistic Approach Examining RFID Design for Security and Privacy,' presents a holistic approach to ensure security and privacy for Radio Frequency Identification (RFID) systems. The second paper, 'Secure Localization and Location Verification in Wireless Sensor Networks: A Survey,' presents a survey on secure localization and location verification in wireless networks. Another paper, 'Requirements and Design for Neutral Trust Management Framework in Unstructured Networks,' designs a neutral trust management framework for MANETs, to ensure that users could obtain services free from discrimination or interference. One more paper, 'User Requirements-Aware Security Ranking in SSL Protocol, proposes a secret exchange algorithm for the Secure Socket Layer (SSL) handshake protocol.
引用
收藏
页码:661 / 663
页数:3
相关论文
共 50 条
  • [21] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    COMPUTER, 2001, 34 (12) : 154 - 157
  • [22] The Pervasive Trust Foundation for Security in Next Generation Networks
    Lilien, Leszek
    Al-Alawneh, Adawia
    Ben Othmane, Lotfi
    NEW SECURITY PARADIGMS WORKSHOP 2010, 2010, : 129 - 141
  • [23] Fourth IEEE international workshop on security, trust, and privacy for software applications: BINDIS 2009
    Li, Yang
    Proceedings - International Computer Software and Applications Conference, 2009, 2
  • [24] Trust in Data Security Protocols and Knowledge of Privacy and Security Technology
    Lyon, Gregory
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 29 - 37
  • [25] Ethics of Big Data: Privacy, Security and Trust
    Yarali, Abdulrahman
    Joyce, Randall
    Dixon, Brandon
    2020 WIRELESS TELECOMMUNICATIONS SYMPOSIUM (WTS), 2020,
  • [26] Requirements for Security, Privacy, and Trust in the Internet of Things
    Mohammed, Sabah
    Kim, Tai-Hoon
    Fang, Wai Chi
    IEEE SECURITY & PRIVACY, 2021, 19 (01) : 8 - 10
  • [27] TRUST, SECURITY AND PRIVACY OF 6G
    Yan, Zheng
    Yang, Laurence T.
    Li, Tieyan
    Miche, Yoan
    Yu, Shui
    Yau, Stephen S.
    IEEE NETWORK, 2022, 36 (04): : 100 - 102
  • [28] Trust, Security and Privacy in Emerging Distributed Systems
    Abawajy, Jemal
    Wang, Guojun
    Yang, Laurence T.
    Javadi, Bahman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 224 - 226
  • [29] Exploring Trust, Security and Privacy in Digital Business
    Fischer-Hubner, Simone
    Furnell, Steven
    Lambrinoudakis, Costas
    TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS I, 2009, 5740 : 191 - 210
  • [30] Information and Future Internet Security, Trust and Privacy
    Meng, Weizhi
    Giannetsos, Thanassis
    Jensen, Christian D.
    FUTURE INTERNET, 2022, 14 (12):