DocumentCode :
2120661
Title :
Pervasive trusted computing
Author :
Balfe, Shane ; Li, Shiqun ; Zhou, Jianying
Author_Institution :
R. Holloway, London Univ.
fYear :
2006
fDate :
29-29 June 2006
Lastpage :
94
Abstract :
This paper analyses the role trusted computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology of Weiser (1991) and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual information as to their surroundings. While mindful of this invisibility property, we examine trusted computing as a component of devices that themselves hold the promise of ubiquity. In this respect, we examine a contrived application scenario in order to abstract a number of useful properties trusted computing can provide in a pervasive setting
Keywords :
security of data; telecommunication security; ubiquitous computing; pervasive trusted computing; ubiquitous environment; Communication system security; Computer vision; Context awareness; Context-aware services; Emotion recognition; Information security; Military computing; Mobile computing; Mood; Pervasive computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006. SecPerU 2006. Second International Workshop on
Conference_Location :
Lyon
Print_ISBN :
0-7695-2549-0
Type :
conf
DOI :
10.1109/SECPERU.2006.14
Filename :
1644283
Link To Document :
بازگشت