Skip to main content

Trust Model for Mobile Devices in Ubiquitous Environment

  • Conference paper
Network-Based Information Systems (NBiS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4658))

Included in the following conference series:

  • 775 Accesses

Abstract

In ubiquitous computing environment, people carrying their mobile devices (eg., mobile phone, PDA, embedded devices) expect to access locally hosted services or resources anytime, anywhere. These mobile devices have restricted capabilities and security supports. Traditional security management systems used definite access control policies for each role or user in each domain server or agent. But in ubiquitous environment, it is hard to specify authorization policies for mobile users and it is inflexible and unavailable for security management of users or mobile devices. To solve these problems, we need trust-based management mechanism as a reference to security management systems. Trust model contains trust relationship and calculation of trust value. Experiences and recommendations are the factors to calculate trust value. In this paper, we design a trust model to calculate trust value and a trust management architecture which can be running in various domain servers and mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust, Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell, Oxford (1988)

    Google Scholar 

  2. Virendra, M., Upadhyaya, S.: Securing Information through Trust Management in Wireless Networks. In: Workshop on Secure Knowledge Management (2004)

    Google Scholar 

  3. Shi, J., von Bochmann, G., Adams, C.M.: A Trust Model with Statistical Foundation. In: 18th International Federation for Information Processing (IFIP) World Computer Congress TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (2004)

    Google Scholar 

  4. Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: Proceedings of the workshop on New security paradigms (1997)

    Google Scholar 

  5. Josang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. In: Decision Support Systems (2006)

    Google Scholar 

  6. Ray, I., Chakraborty, S.: VTrust: A Trust Management System Based on a Vector Model of Trust. In: International Conference on Information Systems Security (2005)

    Google Scholar 

  7. Secure environments for collaboration among ubiquitous roaming entities (SECURE) (2001)

    Google Scholar 

  8. Almenarez, F., Marin, A., et al.: Developing a Model for Trust Management in Pervasive Devices. In: Proceedings of the Fourth IEEE Conference on Pervasive Computing and Com-munications Workshop. IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  9. Grandison, T.: Trust Management for Internet Applications. PhD thesis, Imperial College of Science, University of London, Department of Computing (2003)

    Google Scholar 

  10. Lin, C., Varadharajan, V., et al.: Security and Trust Management in Mobile Agents: A New Perspective. In: Proceedings of The Second International Conference on Mobile Technology, Application and Systems (November 15-17, 2005)

    Google Scholar 

  11. Jameel, H., Hung, L., et al.: A Trust Model for Ubiquitous Systems based on Vectors of Trust Values. In: Proceedings of the Seventh IEEE International Symposium on Multimedia. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  12. McKnight, D., Chevany, N.: The Meanings of Trust. Working paper, Carlson School of Management, University of Minnesota (1996)

    Google Scholar 

  13. Wang, Y., Lin, F.: Trust and Risk Evaluation of Transactions with Different Amounts in Peer-to-Peer E-Commerce Environments. In: The IEEE International Conference on e-Business Engineering, IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomoya Enokido Leonard Barolli Makoto Takizawa

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jiang, Z., Kim, S. (2007). Trust Model for Mobile Devices in Ubiquitous Environment. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74573-0_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74572-3

  • Online ISBN: 978-3-540-74573-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics