By Topic

User Centric Trust-Based Access Control Management for Ubiquitous Computing Environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Bo Fu ; Sch. of Comput. Sci. & Stat., Trinity Coll. Dublin, Dublin ; O'sullivan, D.

Given the diversity of information and services that an individual will want to offer and/or share in a ubiquitous computing environment, it is critical that the individual is provided with mechanisms to manage access and usage to their resources. Mirroring real life, a natural concept for people to grasp when assigning ability to access or use resources is one of "trustworthiness". In previous work, it has been shown that trust is a multi-faceted and personal concept, and so this needs to be catered for in any trust management interactions an individual may have with the ubiquitous environment. This paper describes our recent research in examining such user interactions through the design, implementation and evaluation of an online social network application, as this application raises the kind of issues that will be faced by most individuals in ubiquitous computing environments.

Published in:

Network Operations and Management Symposium Workshops, 2008. NOMS Workshops 2008. IEEE

Date of Conference:

7-11 April 2008