Title :
Researches to the trusted ubiquitous computing
Author_Institution :
Coll. of Electron. & Inf. Eng., Ningbo Univ. of Technol., Ningbo, China
Abstract :
The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned to support the researches.
Keywords :
security of data; ubiquitous computing; decision-making; emotion computing; identification authentication; security requirements; trusted ubiquitous computing; ubiquitous computing network; Authentication; Computational modeling; Decision making; Educational institutions; Sun; Ubiquitous computing; security; trust; ubiquitous computing;
Conference_Titel :
Electronics, Communications and Control (ICECC), 2011 International Conference on
Conference_Location :
Zhejiang
Print_ISBN :
978-1-4577-0320-1
DOI :
10.1109/ICECC.2011.6067854