The University of Southampton
University of Southampton Institutional Repository

A Trust Analysis Methodology for Pervasive Computing Systems

A Trust Analysis Methodology for Pervasive Computing Systems
A Trust Analysis Methodology for Pervasive Computing Systems
We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that describe the typical use of the pervasive system by using a Trust Analysis Grid. The Trust Analysis Grid is composed of eleven Trust Issue Categories that cover the various aspects of the concept of trust in pervasive computing systems. The Trust Analysis Grid is then used to guide the design of the pervasive computing system.
Trust Analysis Methodology, Pervasive Computing, Pervasive Scenario, Trust Analysis Grid
Springer
Lo Presti, S
9dfd53c3-63f7-4d39-ac03-a385a3579c17
Butler, M
54b9c2c7-2574-438e-9a36-6842a3d53ed0
Leuschel, M
38ca23f7-0d9b-4fe9-8388-f0d3a533e263
Booth, C
a8b40706-52e5-4a4c-b8ca-76ad0199c1e3
Falcone, R
Barber, S
Sabater, J
Singh, M
Lo Presti, S
9dfd53c3-63f7-4d39-ac03-a385a3579c17
Butler, M
54b9c2c7-2574-438e-9a36-6842a3d53ed0
Leuschel, M
38ca23f7-0d9b-4fe9-8388-f0d3a533e263
Booth, C
a8b40706-52e5-4a4c-b8ca-76ad0199c1e3
Falcone, R
Barber, S
Sabater, J
Singh, M

Lo Presti, S, Butler, M, Leuschel, M and Booth, C (2005) A Trust Analysis Methodology for Pervasive Computing Systems. In, Falcone, R, Barber, S, Sabater, J and Singh, M (eds.) Trusting Agents for trusting Electronic Societies, LNCS Volume 3577. Springer. (doi:10.1007/11532095).

Record type: Book Section

Abstract

We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that describe the typical use of the pervasive system by using a Trust Analysis Grid. The Trust Analysis Grid is composed of eleven Trust Issue Categories that cover the various aspects of the concept of trust in pervasive computing systems. The Trust Analysis Grid is then used to guide the design of the pervasive computing system.

Text
LBLB-lnai05.pdf - Other
Download (137kB)

More information

Published date: 2005
Keywords: Trust Analysis Methodology, Pervasive Computing, Pervasive Scenario, Trust Analysis Grid
Organisations: Electronic & Software Systems

Identifiers

Local EPrints ID: 260782
URI: http://eprints.soton.ac.uk/id/eprint/260782
PURE UUID: 2fa49ae6-f835-464e-9c87-1838b4fed5de
ORCID for M Butler: ORCID iD orcid.org/0000-0003-4642-5373

Catalogue record

Date deposited: 20 Apr 2005
Last modified: 15 Mar 2024 02:50

Export record

Altmetrics

Contributors

Author: S Lo Presti
Author: M Butler ORCID iD
Author: M Leuschel
Author: C Booth
Editor: R Falcone
Editor: S Barber
Editor: J Sabater
Editor: M Singh

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×