which enables Requester to be able to be recognized by different service provider
entities in different cases. As an essential part of the entire entity recognition scheme,
we propose an algorithm to computer the trust value of Requester based on
Recognizer’s trust infrastructure, so that Recognizer can decide whether it can permit
Requester’s request or not according to a threshold based decision mechanism.
For future work, we will research more on trust infrastructures, especially
dynamically and securely building trust infrastructure. Besides, entities in a trust
infrastructure also have their own trust infrastructure, then how to use these indirect
trust infrastructures will also be researched. Moreover, attribute-based recognition
information exchange will also researched in detail, including designing a protocol to
support such exchange and enable Requester to protect its privacy. Finally, we hope
that entities can update their knowledge on strangers’ trustworthiness and hence their
trust infrastructures can also be refreshed based on their experiences.
References
1. J-M. Seigneur, S. Farrell, C. Jensen, E. Gray, Y. Chen:
"End-to-end trust in pervasive computing starts with recognition". In Proceedings of the
First International Conference on Security in Pervasive Computing, Boppard, Germany,
March 2003
2. J.-M. Seigneur, S. Farrell, and C. D. Jensen, "Secure Ubiquitous computing based on entity
recognition", in Ubicomp'02 Security Workshop, 2002,
3. Yarong Tang. Decentralized Trust Management.
4. M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The Role of Trust
Management in Distributed Systems Security. Chapter in Secure Internet Programming:
Security Issues for Mobile and Distributed Objects, (Vitek and Jensen, eds.) Springer-
Verlag, 1999.
5. Weiser, M. The Computer for the 21st Century. Scientific American , September, 1991.
6. David Garlan, Dan Siewiorek, Asim Smailagic, and Peter Steenkist. "Project Aura: Toward
Distraction-Free Pervasive Computing", in IEE Pervasive Computing, special issue on
"Integrated Pervasive Computing Environments", Volume 21, Number 2, April-June, 2002,
pp. 22-31.
7. M. Satyanarayanan, "Pervasive computing: Vision and challenges," IEEE Personal
Communications, pp. 10--17, August 2001.
8. P. Zimmermann, PGP User’s Guide, MIT Press, Cambridge, 1994.
9. Michael Lyons. Pervasive Computing: Control and Freedom in Cyberspace. 2002
10. M. Barbeau. Mobile, Distributed, and Pervasive Computing, in: I. Stojmenovic, Chapter 27
- Handbook of Wireless Networks and Mobile Computing, John Wiley and Sons, Inc.,
February 2002 (ISBN: 0-471-41902-4)
11. J. Kohl and Clifford Neuman. The kerberos network authentication service (V5). Request
for Comments (Proposed Standard) RFC 1510, Internet Engineering Task Force, September
1993.
12. IETF: Public-Key Infrastructure (X.509).
13. IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access
Control, IEEE Standard 802.1x-2001, June 2001.
14. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings
1996 IEEE Symposium on Security and Privacy, pages 164--173, May 1996
15. M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-
key infrastructures. Lecture Notes in Computer Science, 1550:59--63, 1999.
158