Trust-based Context-aware Authentication System for Ubiquitous Systems
نویسندگان
چکیده
منابع مشابه
Merging Similarity and Trust Based Social Networks to Enhance the Accuracy of Trust-Aware Recommender Systems
In recent years, collaborative filtering (CF) methods are important and widely accepted techniques are available for recommender systems. One of these techniques is user based that produces useful recommendations based on the similarity by the ratings of likeminded users. However, these systems suffer from several inherent shortcomings such as data sparsity and cold start problems. With the dev...
متن کاملBuilding Infrastructure Support for Ubiquitous Context-Aware Systems
Many context-aware systems have been demonstrated in lab environments; however, due to some difficulties such as the scalability and privacy issues, they are not yet practical for deployment on a large scale. This paper addresses these two issues with particular interest in user’s privacy protection and spontaneous system association. A person-centric service infrastructure is proposed together...
متن کاملA Portal for Interacting with Context-aware Ubiquitous Systems
In a project to collect medical data from devices in wearables, the contextual information is essential for use by medics in interpreting the data. We have developed a portal which provides interactive access to the state and context of the devices and to the information collected. The portal is based on a MUD, which provides an appropriate spatial metaphor to reflect the context in the physica...
متن کاملContext-Aware Authentication Framework
We present an extensible context-aware authentication framework which can adapt to the contextual information available in a smart environment. Having confidence in a user's identity and other contextual information is critical to the successful adoption of future mobile, context-aware services. This authentication framework can provide a standard base for the development of context-aware servi...
متن کاملA confidence-aware interval-based trust model
It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2018
ISSN: 1877-0509
DOI: 10.1016/j.procs.2018.07.141