Gathering experience in trust-based interactions

C. English, S. Terzis, K. Stolen (Editor), W.H. Winsborough (Editor), F. Martinelli (Editor), F. Massaci (Editor)

Research output: Chapter in Book/Report/Conference proceedingChapter

5 Citations (Scopus)
35 Downloads (Pure)


As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the shift towards ubiquitous computing systems it is becoming increasingly clear that security is a major concern. While this is true of all computing paradigms, the characteristics of ubiquitous systems amplify this concern by promoting spontaneous interaction between diverse heterogeneous entities across administrative boundaries [5]. Entities cannot therefore rely on a specific control authority and will have no global view of the state of the system. To facilitate collaboration with unfamiliar counterparts therefore requires that an entity takes a proactive approach to self-protection. We conjecture that trust management is the best way to provide support for such self-protection measures.
Original languageEnglish
Title of host publicationProceedings of 4th International Conference on Trust Management
Number of pages14
ISBN (Print)3540342958
Publication statusPublished - 2006

Publication series

NameLecture Notes in Computer Science


  • trust management
  • computer security
  • mobile technologies
  • computer networking

Fingerprint Dive into the research topics of 'Gathering experience in trust-based interactions'. Together they form a unique fingerprint.

Cite this