6 research outputs found

    Ambient Intelligence through Image Retrieval

    Get PDF
    An ambient intelligent environment needs dynamic enrollment of strangers without too much human intervention. For this purpose, we propose an entity recognition process based on images captured with low-cost but widespread webcams and easy-to-deploy image processing techniques. We find that the use of levels of confidence in recognition due to different techniques and context-based image retrieval improves the process

    The SECURE collaboration model

    Get PDF
    The SECURE project has shown how trust can be made computationally tractable while retaining a reasonable connection with human and social notions of trust. SECURE has produced a well-founded theory of trust that has been tested and refined through use in real software such as collaborative spam filtering and electronic purse. The software comprises the SECURE kernel with extensions for policy specification by application developers. It has yet to be applied to large-scale, multi-domain distributed systems taking different application contexts into account. The project has not considered privacy in evidence distribution, a crucial issue for many application domains, including public services such as healthcare and police. The SECURE collaboration model has similarities with the trust domain concept, embodying the interaction set of a principal, but SECURE is primarily concerned with pseudonymous entities rather than domain-structured systems

    A New Algorithm of Trust Formation in Wireless Sensor Networks

    Full text link
    This paper introduces a new algorithm for calculating trust in Wireless Sensor Networks based on the quality of services characteristics expected to be fulfilled by nodes. Figure 3 shows the algorithm being proposed as a flowchart. The flowchart shows the three main sources for computing trust; the previous experience with the nodes, the recommendations from the surrounding nodes and the dispositional trust in nodes (the amount of risk the node is ready to take in the absence of the previous experience and/or the recommendations). Wireless Sensor Networks as an emerging technology has received a great attention from both, researchers and the industry due to the need of tiny and cheap nodes to be distributed in large scales and in difficult environments. The creation, operation, management and survival of Wireless Sensor Networks as a special type of ad hoc network is dependent upon the cooperative and trusting nature of its nodes

    Structured Intuition: A Methodology to Analyse Entity Authentication

    Get PDF

    Security design analysis

    Get PDF
    EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    End-to-end Trust Starts with Recognition

    No full text
    Pervasive computing requires some level of trust to be established between entities. In this paper we argue for an entity recognition based approach to building this trust which di#ers from starting from more traditional authentication methods. We also argue for the concept of a "pluggable" recognition module which allows di#erent recognition schemes to be used in di#erent circumstances. Finally, we propose that the trust in the underlying infrastructure has to be taken into account when considering end-to-end trust
    corecore