Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1050873.1050904acmconferencesArticle/Chapter ViewAbstractPublication PagesubimobConference Proceedingsconference-collections
Article

Interacting with trust in ambient intelligence

Published: 01 June 2004 Publication History

Abstract

This short paper presents the use of computational trust engines in ambient intelligent environments. Beyond the technical challenge of building trust-based security frameworks, our initial investigations and prototypes have shown that the human interfaces of these frameworks are also challenging and need to be studied.

References

[1]
M. Abadi, A. Birrell, M. Burrows, F. Dabek, and T. Wobber. Bankable Postage for Network Services. In Proceedings of ASIAN. Springer-Verlag, 2003.
[2]
V. Cahill and et al. Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing vol. 2(3), 2003.
[3]
D. D. Cosley, S. K. Lam, I. Albert, J. A. Konstan, and J. Riedl. Is Seeing Believing?: How Recommender Interfaces Affect Users' Opinions In Proceedings of the Conference on Human Factors in Computing Systems, 2003.
[4]
A. P. Dempster. A Generalization of Bayesian Inference. In Journal of the Royal Statistical Society, 1968.
[5]
K. Ducatel, M. Bogdanowicz, F. Scapolo, J. Leitjen, and J.-C. Burgelman. That's what friends are for. Ambient Intelligence (AmI) and the IS in 2010. In the congress of Innovations for an e-Society, Challenges for Technology Assessment, 2001.
[6]
S. Dumais, T. Joachims, K. Bharat, and A. Weigend. Report on Implicit Measures of User Interests and Preferences. In Proceedings of the SIGIR Workshop on Implicit Measures of User Interests and Preferences, 2003.
[7]
S. Marsh. Formalising Trust as a Computational Concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, 1994.
[8]
D. H. McKnight and N. L. Chervany. What is Trust? A Conceptual Analysis and an Interdisciplinary Model. In Proceedings of the 2000 Americs Conference on Information Systems, 2000.
[9]
SECURE. Secure Environments for Collaboration among Ubiquitous Roaming Entities. http://secure.dsg.cs.ted.ie, 2004.
[10]
J.-M. Seigneur, S. Farrell, C. D. Jensen, E. Gray, and Y. Chen. End-to-end Trust Starts with Recognition. In Proceedings of the First International Conference on Security in Pervasive Computing. Springer, 2003.
[11]
J.-M. Seigneur and C. D. Jensen. Trading Privacy for Trust. In Proceedings of the 2nd Trust Management Conference. Springer, 2004.
[12]
J.-M. Seigneur and C. D. Jensen. Trust Enhanced Ubiquitous Payment without Too Much Privacy Loss. In Proceedings of the 19th Symposium on Applied Computing. ACM, 2004.
[13]
J.-M. Seigneur, C. D. Jensen, S. Farrell, E. Gray, and Y. Chen. Towards Security Auto-configuration for Smart Appliances. In Proceedings of the Smart Objects Conference, 2003.
[14]
G. Shafer. A Mathematical Theory of Evidence. In Princeton University, 1976.
[15]
M. Weiser. The Computer for the 21st Century. Scientific American, 1991.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiMob '04: Proceedings of the 1st French-speaking conference on Mobility and ubiquity computing
June 2004
226 pages
ISBN:1581139152
DOI:10.1145/1050873
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Architecture, Réseaux et systèmes, Parallélisme, GdR-CNRS
  • ACM: Association for Computing Machinery
  • Institut IMAG: Informatique et Mathématiques Appliquées de Grenoble
  • AFIHM: Ass. Francophone d'Interaction Homme-Machine
  • GdR I3: Information, Interaction, Intelligence, GdR-CNRS
  • CNRT Télius: Centre National de Recherche Technologique Télius

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. auto-configuration
  2. computational trust
  3. human interface
  4. ubiquitous computing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 169
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media