References
- M. Weiser, "The computer for the 21st century," Scientific American, vol. 265, no. 3, pp. 75-66, 1991.
- T. Sun and M. K. Denko, "Performance Evaluation of Trust Management in Pervasive Computing," in Proc. of the 22nd International Conference on Advanced Information Networking and Applications, 2008, pp. 386-394.
- L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments," Computer, vol. 34, no. 12, pp. 154-157, 2001. https://doi.org/10.1109/2.970591
- S. Lahlou, M. Langheinrich, and C. Rocker, "Privacy and trust issues with invisible computers," Communications of the ACM, vol. 48, no. 3, pp. 59-60, 2005.
- M. Langheinrich, "Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems," in Proc. of the 3rd international conference on Ubiquitous Computing, Atlanta, Georgia, USA, 2001, pp. 273-291.
- H. Alemdar and C. Ersoy, "Wireless sensor networks for healthcare: A survey," Computer Networks, vol. 54, no. 15, pp. 2688-2710, Oct. 2010. https://doi.org/10.1016/j.comnet.2010.05.003
- Z. Yan and S. Holtmanns, "Trust Modeling and Management: from Social Trust to Digital Trust," in Proc. of Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions, IGI Global, 2008, pp. 290-323.
- C. T. Nguyen, O. Camp, and S. Loiseau, "A Bayesian network based trust model for improving collaboration in mobile ad hoc networks," in Proc. of the 2007 IEEE International Conference on Research, Innovation and Vision for the Future, 2007, pp. 144-151.
- C. T. Nguyen and O. Camp, "Using Context Information to Improve Computation of Trust in Ad Hoc Networks," in Proc. of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, 2008, pp. 619-624.
- K. Sarkio and S. Holtmanns, "Tailored trustworthiness estimations in Peer-to-Peer networks," International Journal of Internet Technology and Secured Transactions, vol. 1, no. 1/2, pp. 95-107, 2007. https://doi.org/10.1504/IJITST.2007.014836
- S. Holtmanns and Z. Yan, "Context-Aware Adaptive Trust," Developing Ambient Intelligence, Springer Paris, 2006, pp. 137-146.
- Z. Liu, A. W. Joy, and R. A. Thompson, "A Dynamic Trust Model for Mobile Ad Hoc Networks," in Proc. of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems FTDCS 2004, 2004, pp. 80-85.
- Y. Wang and V. Varadharajan, "Trust2: Developing Trust in Peer-to-Peer Environments," in Proc. of the 2005 IEEE International Conference on Services Computing - Volume 01, 2005, pp. 24-34.
- K. Ranganathan, "Trustworthy Pervasive Computing: The Hard Security Problems," in Proc. of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004, pp. 117-121.
- TCG, "Trusted Computing Group - Trusted Platform Module," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/developers/trusted_platform_module. [Accessed: 07-Dec-2011].
- F. Gomez Marmol and G. Martinez Perez, "Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems," Computer Standards & Interfaces, vol. 32, no. 4, pp. 185-196, Jun. 2010.
- H. Khiabani, J. Ab Manan, and Z. M. Sidek, "A Study of Trust & Privacy Models in Pervasive Computing," in Proc. of International Conference for Technical Postgraduates (TECHPOS 2009), Kuala Lumpur, 2009.
- C. Krauß, F. Stumpf, and C. Eckert, "Detecting node compromise in hybrid wireless sensor networks using attestation techniques," in Proc. of the 4th European conference on Security and privacy in ad-hoc and sensor networks, Berlin, Heidelberg, 2007, pp. 203-217.
- Y. Yang, J. Zhou, R. H. Deng, and F. Bao, "Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks," Security and Communication Networks, vol. 4, no. 1, pp. 11-22, 2011. https://doi.org/10.1002/sec.179
- H. Khiabani, Z. M. Sidek, and J. Ab Manan, "Towards a Unified Trust Model in Pervasive Systems," in Proc. of 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, Perth-Australia, 2010, pp. 831-835.
- TCG, "Trusted Computing Group," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/. [Accessed: 07-Dec-2011].
- TCG, "Trusted Computing Group - Mobile Trusted Module," 2011. [Online]. Available: http://www.trustedcomputinggroup.org/developers/mobile. [Accessed: 07-Dec-2011].
- R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn, "Design and implementation of a TCG-based integrity measurement architecture," in Proc. of the 13th conference on USENIX Security Symposium - Volume 13, Berkeley, CA, USA, 2004, pp. 16-16.
- A.-R. Sadeghi and C. Stüble, "Property-based attestation for computing platforms: caring about properties, not mechanisms," in Proc. of the 2004 workshop on New security paradigms, New York, NY, USA, 2004, pp. 67-77. Article
- L. Chen, H. Löhr, M. Manulis, and A.-R. Sadeghi, "Property-Based Attestation without a Trusted Third Party," Information Security, vol. 5222, T.-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 31-46. Article
- F. Gomez Marmol and G. Martinez Perez, "TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks," in Proc. of IEEE International Conference on Communications ( ICC '09), 2009, pp. 1-5. Article
- F. Gomez Marmol, "TRMSim-WSN - Trust and Reputation Models Simulator for Wireless Sensor Networks," 2012. [Online]. Available: http://ants.dif.um.es/-felixgm/research/trmsim-wsn/. [Accessed: 21-Jan-2012].
Cited by
- Research on Trust Prediction from a Sociological Perspective vol.30, pp.4, 2013, https://doi.org/10.1007/s11390-015-1564-8