Trust, security and privacy for pervasive applications

被引:5
|
作者
Wang, Guojun [1 ]
Zhou, Wanlei [2 ]
Yang, Laurence T. [3 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
来源
JOURNAL OF SUPERCOMPUTING | 2013年 / 64卷 / 03期
关键词
D O I
10.1007/s11227-013-0953-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
April 2013 Special section of the Journal of Supercomputer reviews high quality research papers that report the latest research achievements in trust, security and privacy for pervasive applications. The first paper, 'A Holistic Approach Examining RFID Design for Security and Privacy,' presents a holistic approach to ensure security and privacy for Radio Frequency Identification (RFID) systems. The second paper, 'Secure Localization and Location Verification in Wireless Sensor Networks: A Survey,' presents a survey on secure localization and location verification in wireless networks. Another paper, 'Requirements and Design for Neutral Trust Management Framework in Unstructured Networks,' designs a neutral trust management framework for MANETs, to ensure that users could obtain services free from discrimination or interference. One more paper, 'User Requirements-Aware Security Ranking in SSL Protocol, proposes a secret exchange algorithm for the Secure Socket Layer (SSL) handshake protocol.
引用
收藏
页码:661 / 663
页数:3
相关论文
共 50 条
  • [31] Security, Privacy and Trust for Responsible Innovations and Governance
    Atluri, Vijay
    Hong, Yuan
    Chun, Soon Ae
    PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON DIGITAL GOVERNMENT RESEARCH, DGO 2020, 2020, : 365 - 366
  • [32] Sousveillance Implications for privacy, security, trust, and the law
    Michael, Katina
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2015, 4 (02) : 92 - 94
  • [33] Special Issue Challenges for Security, Privacy and Trust
    Gritzalis, Dimitris
    Lopez, Javier
    COMPUTERS & SECURITY, 2010, 29 (05) : 521 - 522
  • [34] A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing
    Feng, Wei
    Yan, Zheng
    Zhang, Hengrun
    Zeng, Kai
    Xiao, Yu
    Hou, Y. Thomas
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2971 - 2992
  • [35] A Trust Model for Security and Privacy in Cloud Services
    Himanshu, Gupta
    Afewou, Kodjo Desire
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 443 - 450
  • [36] Security and privacy in pervasive computing state of the art and future directions
    Hutter, D
    Stephan, W
    Ullmann, M
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 285 - 289
  • [37] Pervasive Security and Privacy-A Brief Reflection on Challenges and Opportunities
    Alt, Florian
    IEEE PERVASIVE COMPUTING, 2021, 20 (04) : 82 - 86
  • [38] Pervasive eHealth Services A Security and Privacy Risk Awareness Survey
    Bellekens, Xavier
    Seeam, Preetila
    Franssen, Quentin
    Hamilton, Andrew
    Nieradzinska, Kamila
    Seeam, Amar
    2016 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA), 2016,
  • [39] Trust, privacy and relationships in 'Pervasive education': Families' views on homework and technologies
    Fraser, Katie
    Rodden, Tom
    O'Malley, Claire
    PERVASIVE COMPUTING, PROCEEDINGS, 2007, 4480 : 180 - +
  • [40] An Adaptive Framework for Trust based Security in Pervasive Computing Environment
    Iltaf, Naima
    Ghafoor, Abdul
    Hussain, Khtar
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 624 - 628