Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties.
History
Event
Cyber Security and Information Intelligence Research. Workshop (6th : 2010 : Oak Ridge, Tennessee)
Pagination
1 - 4
Publisher
ACM
Location
Oak Ridge, Tennessee
Place of publication
New York, N. Y.
Start date
2010-04-21
End date
2010-04-23
ISBN-13
9781450300179
Language
eng
Publication classification
E1.1 Full written paper - refereed
Copyright notice
2010, ACM
Title of proceedings
CSIIRW10 : Cyber Security and Information Intelligence Challenges and Strategies, ACM International Conference Proceeding Series