Trust, security and privacy for pervasive applications

被引:5
|
作者
Wang, Guojun [1 ]
Zhou, Wanlei [2 ]
Yang, Laurence T. [3 ]
机构
[1] Cent S Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
[3] St Francis Xavier Univ, Dept Comp Sci, Antigonish, NS B2G 2W5, Canada
来源
JOURNAL OF SUPERCOMPUTING | 2013年 / 64卷 / 03期
关键词
D O I
10.1007/s11227-013-0953-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
April 2013 Special section of the Journal of Supercomputer reviews high quality research papers that report the latest research achievements in trust, security and privacy for pervasive applications. The first paper, 'A Holistic Approach Examining RFID Design for Security and Privacy,' presents a holistic approach to ensure security and privacy for Radio Frequency Identification (RFID) systems. The second paper, 'Secure Localization and Location Verification in Wireless Sensor Networks: A Survey,' presents a survey on secure localization and location verification in wireless networks. Another paper, 'Requirements and Design for Neutral Trust Management Framework in Unstructured Networks,' designs a neutral trust management framework for MANETs, to ensure that users could obtain services free from discrimination or interference. One more paper, 'User Requirements-Aware Security Ranking in SSL Protocol, proposes a secret exchange algorithm for the Secure Socket Layer (SSL) handshake protocol.
引用
收藏
页码:661 / 663
页数:3
相关论文
共 50 条
  • [41] A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks
    Denko, Mieso K.
    Sun, Tao
    Woungang, Isaac
    Rodrigues, Joel J. P. C.
    Chao, Han-Chieh
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 3670 - +
  • [42] The Effect of Providing Visualizations in Privacy Policies on Trust in Data Privacy and Security
    Becker, Joerg
    Heddier, Marcel
    Oeksuez, Ayten
    Knackstedt, Ralf
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 3224 - 3233
  • [43] Security for pervasive health monitoring sensor applications
    Venkatasubramanian, Krishna K.
    Gupta, Sandeep K. S.
    FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSING AND INFORMATION PROCESSSING, PROCEEDINGS, 2006, : 197 - +
  • [44] Microcontrollers as (In) Security Devices for Pervasive Computing Applications
    Strobel, Daehyun
    Oswald, David
    Richter, Bastian
    Schellenberg, Falk
    Paar, Christof
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1157 - 1173
  • [45] Advances in mobile computing and applications: Security, privacy and trust: Welcome message from workshop organizers
    Kurkovsky, Stan
    24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, 2010,
  • [46] Enabling privacy and security in Cloud of Things: Architecture, applications, security & privacy challenges
    Ari, Ado Adamou Abba
    Ngangmo, Olga Kengni
    Titouna, Chafiq
    Thiare, Ousmane
    Kolyang
    Mohamadou, Alidou
    Gueroui, Abdelhak Mourad
    APPLIED COMPUTING AND INFORMATICS, 2024, 20 (1/2) : 119 - 141
  • [47] Enhancing Security, Privacy, and Trust in Connected UAV Systems
    Mukkamala, Ravi
    Aljohani, Meshari
    Rangi, Aditya
    Olariu, Stephen
    2023 IEEE/AIAA 42ND DIGITAL AVIONICS SYSTEMS CONFERENCE, DASC, 2023,
  • [48] Security, privacy and trust of user-centric solutions
    Akram, Raja Naeem
    Chen, Hsiao-Hwa
    Lopez, Javier
    Sauveron, Damien
    Yang, Laurence T.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 417 - 420
  • [49] Security and privacy in a middleware for large scale mobile and pervasive augmented reality
    Ferreira, Pedro
    Orvalho, Joao
    Boavida, Fernando
    SOFTCOM 2007: 15TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS, 2007, : 365 - 369
  • [50] Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"
    Liu, Peng
    Molva, Refik
    Jing, Jiwu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1522 - 1523