Article thumbnail

Privacy, security, and trust issues in smart environments

By P. Nixon, W. Wagealla, C. English and S. Terzis


Recent advances in networking, handheld computing and sensor technologies have driven forward research towards the realisation of Mark Weiser's dream of calm and ubiquitous computing (variously called pervasive computing, ambient computing, active spaces, the disappearing computer or context-aware computing). In turn, this has led to the emergence of smart environments as one significant facet of research in this domain. A smart environment, or space, is a region of the real world that is extensively equipped with sensors, actuators and computing components [1]. In effect the smart space becomes a part of a larger information system: with all actions within the space potentially affecting the underlying computer applications, which may themselves affect the space through the actuators. Such smart environments have tremendous potential within many application areas to improve the utility of a space. Consider the potential offered by a smart environment that prolongs the time an elderly or infirm person can live an independent life or the potential offered by a smart environment that supports vicarious learning

Topics: QA75
Publisher: John Wiley & Sons Inc.
Year: 2004
OAI identifier:

Suggested articles


  1. (2002). A Privacy Awareness System for Ubiquitous Computing Environments”, doi
  2. (2002). A Security Architecture Based on Trust Management for Pervasive Computing Systems”. doi
  3. (1998). Compliance checking in the policymaker trust management system”. In doi
  4. (1994). Context-aware computing applications. doi
  5. (1996). Decentralized trust management”. doi
  6. (2003). Delegation Logic: A Logicbased Approach to Distributed Authorization” doi
  7. (2003). Distributed Credential Chain Discovery in Trust Management” doi
  8. (1994). Formalising Trust as a Computational Concept”.
  9. (1999). Gerard Lacey and Simon Dobson (eds), Managing interactions in smart environments, doi
  10. (1999). Informational Privacy, Data Mining, and the Internet."
  11. (2002). Jalal Al-Muhtadi, Prasad Naldurg, doi
  12. (2003). Kouadri Mostéfaoui: Security in Pervasive Environments, What's Next? Security and Management
  13. (2001). Logic for Uncertain Probabilities”. doi
  14. (2000). Managing Smart Environments doi
  15. (2001). Mustaque Ahamad, Gregory D. Abowd: Securing context-aware applications using environment roles. SACMAT doi
  16. Privacy and Freedom. doi
  17. Privacy by Design – Principles of Privacy Aware Ubiquitous Systems, doi
  18. (2001). Privacy Protection, Control of Information, and Privacy-Enhancing Technologies'. doi
  19. (1997). REFEREE: Trust Management for Web Applications," doi
  20. (2002). Requirements for Policy Languages for Trust Negotiation” doi
  21. (2003). RT: A Role-based Trust-management Framework”. doi
  22. (2002). SECURE Deliverable 1.1: A Model For Trust”,
  23. (2002). Security for Ubiquitous Computing,
  24. (2001). Security Weaknesses in Bluetooth. doi
  25. (2001). Software security and privacy risks in mobile ecommerce, doi
  26. (2003). Sotirios Terzis and Colin English, Trust-based model for privacy control in context-aware systems, doi
  27. (2000). Supporting Trust in Virtual Communities" doi
  28. (1999). The KeyNote Trust Management System - Version 2”. Internet Engineering Task Force, doi
  29. (1996). The Meanings of Trust”. working paper,
  30. (1996). The PGP Trust Model” ,
  31. The right to privacy”, doi
  32. (1999). The Role of Trust Management doi
  33. The SECURE collaboration model. Technical report 03. University of Strathclyde, department of Computer and information sciences.
  34. (2002). Tim Finin “A Security Architecture Based on Trust Management for Pervasive Computing Systems”.
  35. (1999). Treur: “Formal Analysis of Models for the Dynamics of Trust Based on Experiences” Modelling Autonomous Agents in a Multi-Agent World doi
  36. (2003). Trust Context Spaces: An Infrastructure for Pervasive Security”, doi
  37. (1995). Trust Formation in New Organisational Relationships”.
  38. (2003). Trust Management Tools for Internet Applications”. doi
  39. (2003). Trust Management," doi
  40. (2002). Twigg: “SECURE Deliverable 3.1: Definition of Risk Model”,
  41. (2003). Using Trust for Secure Collaboration in Uncertain environments," doi
  42. (2000). Walking the Web of Trust”, Proceeding of WETICE,

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.