@inbook{a7318ebb1ded4029ad5b000c6db06406,
title = "Gathering experience in trust-based interactions",
abstract = "As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the shift towards ubiquitous computing systems it is becoming increasingly clear that security is a major concern. While this is true of all computing paradigms, the characteristics of ubiquitous systems amplify this concern by promoting spontaneous interaction between diverse heterogeneous entities across administrative boundaries [5]. Entities cannot therefore rely on a specific control authority and will have no global view of the state of the system.To facilitate collaboration with unfamiliar counterparts therefore requires that an entity takes a proactive approach to self-protection. We conjecture that trust management is the best way to provide support for such self-protection measures.",
keywords = "trust management, computer security, mobile technologies, computer networking",
author = "C. English and S. Terzis and K. Stolen and W.H. Winsborough and F. Martinelli and F. Massaci",
year = "2006",
language = "English",
isbn = "3540342958",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "62--76",
booktitle = "Proceedings of 4th International Conference on Trust Management",
}