DocumentCode :
2198711
Title :
Researches to the trusted ubiquitous computing
Author :
Sun, Daoqing
Author_Institution :
Coll. of Electron. & Inf. Eng., Ningbo Univ. of Technol., Ningbo, China
fYear :
2011
fDate :
9-11 Sept. 2011
Firstpage :
433
Lastpage :
437
Abstract :
The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned to support the researches.
Keywords :
security of data; ubiquitous computing; decision-making; emotion computing; identification authentication; security requirements; trusted ubiquitous computing; ubiquitous computing network; Authentication; Computational modeling; Decision making; Educational institutions; Sun; Ubiquitous computing; security; trust; ubiquitous computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics, Communications and Control (ICECC), 2011 International Conference on
Conference_Location :
Zhejiang
Print_ISBN :
978-1-4577-0320-1
Type :
conf
DOI :
10.1109/ICECC.2011.6067854
Filename :
6067854
Link To Document :
بازگشت