Privacy, Security and Trust within the Context of Pervasive Computing

Editors:

ISBN: 978-0-387-23461-8 (Print) 978-0-387-23462-5 (Online)

Table of contents (17 chapters)

  1. The Influence of Context on Privacy, Trust and Security

    1. Front Matter

      Pages ix-ix

    2. No Access

      Book Chapter

      Pages 1-16

      Some Research Challenges in Pervasive Computing

    3. No Access

      Book Chapter

      Pages 19-21

      Overview

    4. No Access

      Book Chapter

      Pages 23-34

      Survey on Location Privacy in Pervasive Computing

    5. No Access

      Book Chapter

      Pages 35-48

      Exploring the Relationship Between Context and Privacy

    6. No Access

      Book Chapter

      Pages 49-59

      Privacy, Security and Trust Issues Raised by the Personal Server Concept

  2. Secure Trust Models and Management in Pervasive Computing

    1. Front Matter

      Pages 61-61

    2. No Access

      Book Chapter

      Pages 63-64

      Overview

    3. No Access

      Book Chapter

      Pages 65-75

      The Role of Identity in Pervasive Computational Trust

    4. No Access

      Book Chapter

      Pages 77-82

      Towards a Next-Generation Trust Management Infrastructure for Open Computing Systems

    5. No Access

      Book Chapter

      Pages 83-91

      Research Directions for Trust and Security in Human-Centric Computing

  3. Evidence, Authentication, and Identity

    1. Front Matter

      Pages 93-93

    2. No Access

      Book Chapter

      Pages 95-97

      Overview

    3. No Access

      Book Chapter

      Pages 99-104

      User-Centric Identity Management in Open Mobile Environments

    4. No Access

      Book Chapter

      Pages 105-112

      Pre-Authentication Using Infrared

    5. No Access

      Book Chapter

      Pages 113-129

      Architecture and Protocol for Authorized Transient Control

  4. Social and Technical Approaches to Privacy Protection

    1. Front Matter

      Pages 131-131

    2. No Access

      Book Chapter

      Pages 133-135

      Overview

    3. No Access

      Book Chapter

      Pages 137-146

      Maintaining Privacy in RFID Enabled Environments

    4. No Access

      Book Chapter

      Pages 147-155

      Safeguarding Personal Data Using Trusted Computing in Pervasive Computing

    5. No Access

      Book Chapter

      Pages 157-167

      A Social Approach to Privacy in Location-Enhanced Computing