Pervasive Trusted Computing

被引:1
|
作者
Balfe, Shane [1 ]
Li, Shiqun [2 ]
Zhou, Jianying [3 ]
机构
[1] Univ London Royal Holloway & Bedford New Coll, London NW1 4NS, England
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[3] Inst InfoComm Res, Singapore, Singapore
关键词
D O I
10.1109/SECPERU.2006.14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper will analyse the role Trusted Computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology of Weiser [32] and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual information as to their surroundings. While mindful of this invisibility property, we will examine Trusted Computing as a component of devices that themselves hold the promise of ubiquity. In this respect, we examine a contrived application scenario in order to abstract a number of useful properties Trusted Computing can provide in a pervasive setting.
引用
收藏
页码:88 / +
页数:2
相关论文
共 50 条
  • [41] Pervasive Computing in Daidalos
    Taylor, Nicholas K.
    Robertson, Patrick
    Farshchian, Babak A.
    Doolin, Kevin
    Roussaki, Ioanna G.
    Marshall, Liam
    Mullins, Robert
    Druesedow, Steffen
    Dolinar, Kajetan
    IEEE PERVASIVE COMPUTING, 2011, 10 (01) : 74 - 81
  • [42] Automotive Pervasive Computing
    Schmidt, Albrecht
    Paradiso, Joseph
    Noble, Brian
    IEEE PERVASIVE COMPUTING, 2011, 10 (03) : 12 - 13
  • [43] Trusted computing, trusted third parties, and verified communications
    Abadi, M
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
  • [44] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [45] An overview of pervasive computing
    Gupta, SKS
    Lee, WC
    Purakayastha, A
    Srimani, PK
    IEEE PERSONAL COMMUNICATIONS, 2001, 8 (04): : 8 - 9
  • [46] Research of Pervasive Computing
    Li Gang
    Chen Anfang
    Yan Junhao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 183 - 185
  • [47] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [48] Pervasive Computing in Space
    Diaz-Artiles, Ana
    Ekblaw, Ariel
    Falco, Gregory
    Frank, Jeremy D.
    Paradiso, Joseph A.
    IEEE PERVASIVE COMPUTING, 2023, 22 (02) : 4 - 6
  • [49] Middleware for pervasive computing
    Kumar, Mohan
    Zambonelli, Franco
    PERVASIVE AND MOBILE COMPUTING, 2007, 3 (04) : 329 - 331
  • [50] Pervasive Computing Moves In
    Brush, A. J.
    Hong, Jason
    Scott, James
    IEEE PERVASIVE COMPUTING, 2016, 15 (02) : 14 - 15