Security for interactions in pervasive networks: Applicability of recommendation systems

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Recent growth in the sales of Bluetooth-enabled handsets allows short-lived automated interactions between personal devices to become popular outside the research laboratories. In these new kinds of networks, automated data transfer between devices can now be achieved and there are many use cases, but a missing element is a consistent approach to the problem of risk management in automatic interactions. Access to centralized servers is not feasible, so security management will lie in the hands of end-users. We investigate the features present in these networks that could be used to mitigate risk and present existing research in the areas of ad hoc network security and distributed recommendation systems, discussing their potential for solving these problems. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Moloney, S., & Ginzboorg, P. (2005). Security for interactions in pervasive networks: Applicability of recommendation systems. In Lecture Notes in Computer Science (Vol. 3313, pp. 95–106). Springer Verlag. https://doi.org/10.1007/978-3-540-30496-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free