A strategic agency under
A strategic agency under MOSTI

 


A Study of Trust and Privacy Models in Pervasive Computing Approach to Trusted Computing PlatformsApril 30, 2012

Author(s)
Hamed Khiabani, Jamalul-Lail Ab Manan and Zailani Mohamed Sidek

Summary
In this paper, the authors review previous trust and privacy models in pervasive systems and analyze them to highlight the importance of trusted computing platforms in tackling their weaknesses.

Abstract
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So trust and privacy would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust and privacy models which unifies different technologies to precisely calculate trustworthiness of each party and maintain privacy. In this paper we review previous trust and privacy models in pervasive systems and analyze them to highlight the importance of trusted computing platforms in tackling their weaknesses.

Source Info
2009 International Conference for Technical Postgraduates (TECHPOS), 14-15 Dec. 2009

R&D Area
Information Security

Links
http://www.mendeley.com/

Back to Top