Trustworthiness and authentication in ubiquitous computing

In a pervasive computing environment, principle authentication verifies if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in… CONTINUE READING