Privacy Enhanced Pervasive Computing Model with Dynamic Trust and Security

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security, Trust and Privacy – A New Direction for Pervasive Computing

-Information which used to be privileged only for the rich and powerful few has become crucial part of our life. Everyone is now very aware of the need to protect sensitive and valuable information from unintentionally being presented to other individuals or organizations. In the open environment such as the internet, there are suspicious individuals with insincere motives who are cautiously tr...

متن کامل

Towards Security and Privacy for Pervasive Computing

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional dist...

متن کامل

Trust, Security and Privacy in Global Computing

During the past thirty years, the world of computing has evolved from large centralised computing centres to an increasingly distributed computing environment, where computation and communication capabilities are being embedded in artefacts of everyday life. Billions of computational entities will interact in systems with ever changing configurations determined by local and global context, for ...

متن کامل

Privacy, Security and Trust in Cloud Computing

 Privacy, Security and Trust in Cloud Computing

متن کامل

Trust Based Privacy Protection Method in Pervasive Computing

In pervasive computing environments, resources and services are usually provided by a variety of different suppliers with multiple computing devices and from heterogeneous networks. Accordingly, various privacy protection methods with lots of privacy policies were used. Before some meaningful interaction starts or services offers, a certain level of trust must be established, this trust establi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Research Journal of Applied Sciences, Engineering and Technology

سال: 2014

ISSN: 2040-7459,2040-7467

DOI: 10.19026/rjaset.7.877