Recent growth in the sales of Bluetooth-enabled handsets allows short-lived automated interactions between personal devices to become popular outside the research laboratories. In these new kinds of networks, automated data transfer between devices can now be achieved and there are many use cases, but a missing element is a consistent approach to the problem of risk management in automatic interactions. Access to centralized servers is not feasible, so security management will lie in the hands of end-users. We investigate the features present in these networks that could be used to mitigate risk and present existing research in the areas of ad hoc network security and distributed recommendation systems, discussing their potential for solving these problems. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Moloney, S., & Ginzboorg, P. (2005). Security for interactions in pervasive networks: Applicability of recommendation systems. In Lecture Notes in Computer Science (Vol. 3313, pp. 95–106). Springer Verlag. https://doi.org/10.1007/978-3-540-30496-8_9
Mendeley helps you to discover research relevant for your work.