{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:04:59Z","timestamp":1754157899570,"version":"3.41.2"},"reference-count":21,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2005,11,1]],"date-time":"2005-11-01T00:00:00Z","timestamp":1130803200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,11,1]]},"abstract":"<jats:p>The challenge of pervasive computing consists in offering access to computing services anywhere and anytime with any devices. However, before it becomes a reality, the problems of access control and authentication have to be solved, among others. Existing solutions are inadequate without adaptation to\nthis specific environment. Among the promising approaches, the trust paradigm seems to be more flexible than others. We base this proposal on this paradigm to implement a distrust model, so\u2010called APC (Access Pass Certificate). The main objective of this model is to enable authorized user to roam and to access trusted sites though they are not known locally. A user can claim two kinds of APCs provided by two kinds of sites: the home site\n(where the user has an account) and the trusted site (that trusts the user). Using these certificates, the user can progressively\nextend her access scope. This model implements a decentralized mapping policy, where the correspondence between the user\u2019s home profile and her rights in the trusted sites is determined by the trusted site. This distrust model and its implementation are presented in this article where we exhibit its importance for large but controlled access in pervasive environments.<\/jats:p>","DOI":"10.1108\/17427370580000132","type":"journal-article","created":{"date-parts":[[2010,6,5]],"date-time":"2010-06-05T07:18:54Z","timestamp":1275722334000},"page":"289-299","source":"Crossref","is-referenced-by-count":9,"title":["(Dis)trust certification model for large access in a pervasive environment"],"prefix":"10.1108","volume":"1","author":[{"given":"Rachid","family":"Saadi","sequence":"first","affiliation":[]},{"given":"Jean\u2010Marc","family":"Pierson","sequence":"additional","affiliation":[]},{"given":"Lionel","family":"Brunie","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"volume-title":"On Trust for Ubiquitous Computing. Workshop on Security in Ubiquitous Computing","year":"2004","author":"Shankar N.","key":"p_1"},{"volume-title":"EasyLiving: Technologies for Intelligent Environments. 2nd International Symposium on Handheld and Ubiquitous Computing","year":"2000","author":"Brummit B.","key":"p_2"},{"key":"p_3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00181-X"},{"volume-title":"Technical report, TR CS-01-06, Department of Computer Science and Electrical Engineering","year":"2001","author":"Kagal L.","key":"p_4"},{"key":"p_5","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283739"},{"key":"p_6","unstructured":"S. P. Marsh. Formalising Trust as a Computational Concept. PhD thesis,University of Stirling, April 1994."},{"volume-title":"Valuation of Trust in Open Networks. The European Symposium on Research in Computer Security","year":"1994","author":"Beth T.","key":"p_7"},{"volume-title":"The Official PGP User's Guide","year":"1995","author":"Zimmermann P. R.","key":"p_8"},{"key":"p_10","doi-asserted-by":"crossref","unstructured":"L. Seitz, J. M. Pierson and L. Brunie. Semantic Access Control for Medical Applications in Grid Environments. International Conference on Parallel and Distributed Computing, pp.374-383, August 2003.","DOI":"10.1007\/978-3-540-45209-6_56"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1109\/2.970591"},{"key":"p_12","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_23"},{"key":"p_13","first-page":"73","volume-title":"Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents","author":"Kagal L.","year":"2001"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011293"},{"volume-title":"Security for Grid Services. Twelfth International Symposium on High Performance Distributed Computing","year":"2003","author":"Welch V.","key":"p_15"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"p_17","unstructured":"D. E. Bell. A Refinement of the Mathematical Model. Technical Report ESD-TR-278 vol.3, The Mitre Corp., Bedford,MA, 1973."},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"p_19","first-page":"693","volume-title":"The Fourth International Conference on Computer and Information Technology","author":"Hu M.","year":"2004"},{"volume-title":"PTM: A Pervasive Trust Management Model for Dynamic Open Environments. Workshop on Pervasive Security, Privacy and Trust","year":"2004","author":"Garcia C.","key":"p_20"},{"volume-title":"ISO\/IEC 9594-8 The Directory: Authentication Framework","year":"2000","author":"Rec U-T","key":"p_21"},{"volume-title":"Modeling User Intention in Pervasive Service Environments. The International Conference on Embedded and Ubiquitous Computing","year":"2005","author":"Scuturici L.","key":"p_22"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427370580000132\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/17427370580000132\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:22:16Z","timestamp":1753402936000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/1\/4\/289-299\/161362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,1]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,11,1]]}},"alternative-id":["10.1108\/17427370580000132"],"URL":"https:\/\/doi.org\/10.1108\/17427370580000132","relation":{},"ISSN":["1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2005,11,1]]}}}