Limits...
An integrative architecture for a sensor-supported trust management system.

Trček D - Sensors (Basel) (2012)

Bottom Line: With this methodology and architecture sensors play a crucial role.The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved.It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.

View Article: PubMed Central - PubMed

Affiliation: Faculty of Computer and Information Science, University of Ljubljana, Tržaška c. 25, 1000 Ljubljana, Slovenia. denis.trcek@fri.uni-lj.si

ABSTRACT
Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.

Show MeSH
Sensors and trust related data capture.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC3472856&req=5

f1-sensors-12-10774: Sensors and trust related data capture.

Mentions: Moving on to full blown communication protocols, which can be deployed in environments where sensors are backed up by microprocessors or microcontrollers, standards have already emerged for point-to-point and also full IP connectivity. A notable example for the first kind of connectivity is physical and link layers focused standard IEEE 802.15.4 [5], while the most notable example for sensor-adjusted IP networking is 6LoWPAN [6]. Consequently, as sensors are made accessible through wireless networks, security issues have become crucial, and these are already being a matter of research, which is very important for trust management purposes (see examples in [7,8]). Summing up, the technological reality has already made such advancements that we can focus on trust management support model and methodology, because technological problems about acquiring and transferring sensor data have already been solved to a large extent (see Figure 1).


An integrative architecture for a sensor-supported trust management system.

Trček D - Sensors (Basel) (2012)

Sensors and trust related data capture.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC3472856&req=5

f1-sensors-12-10774: Sensors and trust related data capture.
Mentions: Moving on to full blown communication protocols, which can be deployed in environments where sensors are backed up by microprocessors or microcontrollers, standards have already emerged for point-to-point and also full IP connectivity. A notable example for the first kind of connectivity is physical and link layers focused standard IEEE 802.15.4 [5], while the most notable example for sensor-adjusted IP networking is 6LoWPAN [6]. Consequently, as sensors are made accessible through wireless networks, security issues have become crucial, and these are already being a matter of research, which is very important for trust management purposes (see examples in [7,8]). Summing up, the technological reality has already made such advancements that we can focus on trust management support model and methodology, because technological problems about acquiring and transferring sensor data have already been solved to a large extent (see Figure 1).

Bottom Line: With this methodology and architecture sensors play a crucial role.The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved.It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.

View Article: PubMed Central - PubMed

Affiliation: Faculty of Computer and Information Science, University of Ljubljana, Tržaška c. 25, 1000 Ljubljana, Slovenia. denis.trcek@fri.uni-lj.si

ABSTRACT
Trust plays a key role not only in e-worlds and emerging pervasive computing environments, but also already for millennia in human societies. Trust management solutions that have being around now for some fifteen years were primarily developed for the above mentioned cyber environments and they are typically focused on artificial agents, sensors, etc. However, this paper presents extensions of a new methodology together with architecture for trust management support that is focused on humans and human-like agents. With this methodology and architecture sensors play a crucial role. The architecture presents an already deployable tool for multi and interdisciplinary research in various areas where humans are involved. It provides new ways to obtain an insight into dynamics and evolution of such structures, not only in pervasive computing environments, but also in other important areas like management and decision making support.

Show MeSH