• Corpus ID: 17343523

A General Risk Assessment of Security in Pervasive Computing

@inproceedings{Chen2003AGR,
  title={A General Risk Assessment of Security in Pervasive Computing},
  author={Yong Chen and Christian Damsgaard Jensen and Elizabeth Gray and Vinny Cahill and Jean-Marc Seigneur},
  year={2003}
}
There is currently much research into using trustbased mechanisms to secure computing in ubiquitous environments, which are typified by unforeseen circumstances, unexpected interactions, and unknown entities. Risk evaluation becomes essential to the trust-based decision-making process in these security mechanisms, especially when the trustworthiness of some entity is unknown and no recommendation information is available. However, risk probability estimating remains unsolved for most… 

Figures and Tables from this paper

Research on Risk Probability Estimating Using Fuzzy Clustering for Dynamic Security Assessment

TLDR
A risk probability assessment formula is proposed, and an estimating model adopting the Fuzzy C-Means clustering algorithm is presented, indicating that fuzzy clustering technique provides concepts and theoretical results that are valuable in formulating and solving problems in dynamic security assessment.

A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing

TLDR
This model is an adaptive hybrid one that allows both secure and non-secure discovery of services on adaptive trust and incorporates a risk model for sharing resources with unknown devices.

SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment

TLDR
The design and implementation of SSRD+ as a whole is illustrated that optimally explores resources without degrading the performance of the devices while ensuring user security and privacy.

A trust-based secure service discovery (TSSD) model for pervasive computing

Research the information security risk assessment technique based on Bayesian network

TLDR
A risk assessment model based on Bayesian network, which used probabilistic reasoning to seek value at risk and combined with expert knowledge is created and it is believed that the model of information security risk assessment based onBayesian analysis is an effective model of risk assessment system.

Security in Pervasive Computing: Current Status and Open Issues

TLDR
This paper examines the recent trends and forward thinking investigation in several fields of security, along with a brief history of previous accomplishments in the corresponding areas.

Enforcing Access Control Using Risk Assessment

TLDR
A new model for risk assessment in ubiquitous environment is designed and use risk as a key component in decision-making process in the authors' access control model, which makes access control management more dynamic and precise.

Putting together QoS and security in autonomic pervasive systems

TLDR
An adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained trade-offs between both QoS and security in pervasive systems is presented.

Research on technologies in quantitative risk assessment and forcast of network security

  • Zhihu WangX. Wang
  • Computer Science
    2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE)
  • 2010
TLDR
This paper introduces nonlinear system theories on chaos and fractal for complexity analysis of network threat frequencies and to reveal the essential characters in the network time series and studies nonlinear chaotic prediction methods for network threatfrequency.

References

SHOWING 1-6 OF 6 REFERENCES

Decentralized trust management

TLDR
This paper presents a comprehensive approach to trust management, based on a simple language for specifying trusted actions and trust relationships, and describes a prototype implementation of a new trust management system, called PolicyMaker, that will facilitate the development of security features in a wide range of network services.

Formalising Trust as a Computational Concept

TLDR
The thesis presents a testbed populated by simple trusting agents which substantiates the utility of the formalism and provides a step in the direction of a proper understanding and definition of human trust.

Using Trust for Secure Collaboration in Uncertain Environments

The SECURE project investigates the design of security mechanisms for pervasive computing based on trust. It addresses how entities in unfamiliar pervasive computing environments can overcome initial

Software system risk management and assurance

TLDR
This paper presents a third-generation framework which demonstrates the viability of an integrative and quantitative approach to risk management in software systems.

Definition of Risk Model

  • Definition of Risk Model
  • 2003