Security, Privacy and Trust in Pervasive and Ubiquitous Computing, International Workshop on
Download PDF

Abstract

This paper will analyse the role Trusted Computing can play in a pervasive/ubiquitous environment. Traditionally, the ideology ofWeiser [32] and others when considering the pervasive computing vista, dictated that computers would invisibly integrate themselves into the background environment, providing useful services to users, as well as contextual information as to their surroundings. While mindful of this invisibility property, we will examine Trusted Computing as a component of devices that themselves hold the promise of ubiquity. In this respect, we examine a contrived application scenario in order to abstract a number of useful properties Trusted Computing can provide in a pervasive setting.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles