Pervasive Systems: Enhancing Trust Negotiation with Privacy Support

  • Jan Porekar
  • Kajetan Dolinar
  • Aleksej Jerman-Blažič
  • Tomaž Klobučar


Privacy Policy Private Data Access Control Policy Privacy Risk Privacy Enforcement 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Saha D, Mukherjee A (2003), Pervasive Computing: A Paradigm for 21st century. IEEE Computer Society.Google Scholar
  2. 2.
    Satyanarayanan M (2001) Pervasive computing: Vision and Challenges. IEEE Personal Communications, IEEE Computer SocietyGoogle Scholar
  3. 3.
    Bhargava B, Lilien L, Rosenthal A, Winslett M (2004) The Pudding of Trust. IEEE Intelligent Systems, IEEE Computer SocietyGoogle Scholar
  4. 4.
    Seamons KE, Winslett M, Yu T, Yu L, Jarvis R (2002) Protecting Privacy During On-line Trust Negotiation. Lecture Notes in Computer Science, Springer-Verlag GmbH , Volume 2482 / 2003, pp. 129–143.Google Scholar
  5. 5.
    Seamons KE, Winslett M, Yu T. (2001) Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. Proc. symposium on network and distributed systems security, NDSSGoogle Scholar
  6. 6.
    Chen W, Clarke L, Kurose J, Towsley D (2004) Optimizing Cost-sensitive Trust-negotiation Protocols. Technical Report 04-29, Dept. of Computer Science, UMass, AmherstGoogle Scholar
  7. 7.
    Prime Consortium (2004) PRIME – Architecture version 0. Deliverable D14.2.aGoogle Scholar
  8. 8.
    Prime Consortium (2005) PRIME – Framework version 1. Deliverable D14.1.aGoogle Scholar
  9. 9.
    DAIDALOS Consortium (2004) DAIDALOS pervasive systems privacy and security framework and mechanisms, Deliverable D421Google Scholar
  10. 10.
    DAIDALOS Consortium (2004) A4C Framework Design Specification. Deliverable D341Google Scholar
  11. 11.
    Richardson M, Agrawal R, Domingos P (2003) Trust Management for the Semantic Web. Proc. 2nd International Semantic Web Conf., LNCS 2870, Springer-Verlag, pp. 351–368.Google Scholar
  12. 12.
    Nejdl W, Olmedilla D, Winslett M. (2004) PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. Secure Data Management, pp. 118–132.Google Scholar
  13. 13.
    Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L (2002) Negotiating trust in the Web. Internet Computing, IEEE, Nov/Dec, Vol. 6, pp. 30–37.Google Scholar
  14. 14.
    OpenCyc, Scholar
  15. 15.
    Wenning R (2005), The Platform for Privacy Preferences 1.1 (P3P1.1) Specification. W3C Working DraftGoogle Scholar
  16. 16.
    Nejdl W, Olmedilla D, Winslett M, Zhang CC (2005) Ontology-Based Policy Specification and Management. Proceedings of European Semantic Web Conference (ESWC2005), May/Jun, Heraklion, Greece.Google Scholar
  17. 17.
    Porekar J, Dolinar K, Jerman Blažič (2007) Middleware for Privacy Protection of Ambient Intelligence and Pervasive Systems. WSEAS Transactions on Information Science and Applications, Issue 3, vol 4, March, p/pp 633–639Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Jan Porekar
    • 1
  • Kajetan Dolinar
    • 1
  • Aleksej Jerman-Blažič
    • 1
  • Tomaž Klobučar
    • 2
  1. 1.SETCCE (Security Technology Competence Centre)Ljubljana
  2. 2.Jožef Stefan InstituteLjubljana

Personalised recommendations