Atlantis Press, 2012. — 278 p.
Ubiquitous Computing (UbiComp) is a vision of rich and seamless interaction with the surrounding computing environment. In spite of the many applications and projects in the area of ubiquitous and pervasive computing the success is still far away. One of the main reasons is the lack of acceptance of and confidence in this technology. Although researchers and industry are working in all of these areas, a forum to elaborate on security, reliability and privacy issues, that resolve in trustworthy interfaces and computing environments for people interacting within these ubiquitous environments is important. The user experience factor of trust thus becomes a crucial issue for the success of UbiComp applications. The goal of this book is to provide a state the art on trustworthy ubiquitous computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues in developing a trustworthy interfaces which are more secure and richer.
The book compiles a series of interesting and timely papers in the areas of 1) trust and context in UbiComp environments, 2) methods and concepts to enhance and ensure reliability in UbiComp environments 3) distributed attacks detection and secure access protocol in MANET, WSN and UbiComp environments and 4) access control and mobile payment in Trustworthy UbiComp environment.
Trust and Context in UbiComp EnvironmentsThe automatic Trust Management of self-adaptive Multi-Display Environments
Malicious Pixels – Using QR Codes as Attack Vector
A Virtual Performance Stage as a Space for Children to Create and Perform Stories
Methods and Concepts to Enhance and Ensure Reliability in UbiComp EnvironmentsNetwork Forensics: Detection and Mitigation of Botnet and Malicious Code via Darknet
Trusted Log Management System
Reasoning of Collaborative Human Behaviour in Security-Critical Work Practices: A Framework
Distributed Attacks Detection and Secure Access Protocol in MANET, WSN and UbiComp EnvironmentsMitigation of Wormhole Attack in Wireless Sensor Networks
Protocol for Secure Access in Mobile Ad-hoc Network for Emergency Services
Access Control and Mobile Payment in Trustworthy UbiComp EnvironmentA Lightweight Graph-Based Pattern Recognition Scheme in Mobile Ad Hoc Networks
Security Framework for Mobile Banking
Anonymous, Secure and Fair Micropayment System to Access Location-Based Services
Privacy Preserving with A Purpose-based Privacy Data Graph