Title :
Pervasive trusted computing
Author :
Balfe, Shane ; Li, Shiqun ; Zhou, Jianying
Author_Institution :
R. Holloway, London Univ.
Abstract :
This paper analyses the role trusted computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology of Weiser (1991) and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual information as to their surroundings. While mindful of this invisibility property, we examine trusted computing as a component of devices that themselves hold the promise of ubiquity. In this respect, we examine a contrived application scenario in order to abstract a number of useful properties trusted computing can provide in a pervasive setting
Keywords :
security of data; telecommunication security; ubiquitous computing; pervasive trusted computing; ubiquitous environment; Communication system security; Computer vision; Context awareness; Context-aware services; Emotion recognition; Information security; Military computing; Mobile computing; Mood; Pervasive computing;
Conference_Titel :
Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. SecPerU 2006. Second International Workshop on
Conference_Location :
Lyon
Print_ISBN :
0-7695-2549-0
DOI :
10.1109/SECPERU.2006.14