TY - GEN
T1 - Security for interactions in pervasive networks
T2 - Applicability of recommendation systems
AU - Moloney, Seamus
AU - Ginzboorg, Philip
PY - 2005
Y1 - 2005
N2 - Recent growth in the sales of Bluetooth-enabled handsets allows short-lived automated interactions between personal devices to become popular outside the research laboratories. In these new kinds of networks, automated data transfer between devices can now be achieved and there are many use cases, but a missing element is a consistent approach to the problem of risk management in automatic interactions. Access to centralized servers is not feasible, so security management will lie in the hands of end-users. We investigate the features present in these networks that could be used to mitigate risk and present existing research in the areas of ad hoc network security and distributed recommendation systems, discussing their potential for solving these problems.
AB - Recent growth in the sales of Bluetooth-enabled handsets allows short-lived automated interactions between personal devices to become popular outside the research laboratories. In these new kinds of networks, automated data transfer between devices can now be achieved and there are many use cases, but a missing element is a consistent approach to the problem of risk management in automatic interactions. Access to centralized servers is not feasible, so security management will lie in the hands of end-users. We investigate the features present in these networks that could be used to mitigate risk and present existing research in the areas of ad hoc network security and distributed recommendation systems, discussing their potential for solving these problems.
U2 - 10.1007/978-3-540-30496-8_9
DO - 10.1007/978-3-540-30496-8_9
M3 - Conference article in proceedings
AN - SCOPUS:23944523927
VL - 3313
T3 - Lecture Notes in Computer Science
SP - 95
EP - 106
BT - Security in Ad-hoc and Sensor Networks
PB - Springer
ER -