{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T21:59:07Z","timestamp":1720821547669},"reference-count":253,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T00:00:00Z","timestamp":1465171200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2016,6,6]]},"abstract":"\nPurpose<\/jats:title>\nEver since Mark Weiser coined the term \u201cubiquitous computing\u201d (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user\u2019s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade.<\/jats:p>\n<\/jats:sec>\n\nDesign\/methodology\/approach<\/jats:title>\nThe results of this paper are based on a literature review method originally used in evidence-based medicine called systematic literature review (SLR), which identifies, filters, classifies and summarizes the findings.<\/jats:p>\n<\/jats:sec>\n\nFindings<\/jats:title>\nStarting from the bibliometric results that clearly show an increasing interest in the topic of ubicomp security worldwide, the findings reveal specific types of attacks and vulnerabilities that have motivated the research over the past decade. This review describes most commonly proposed countermeasures \u2013 context-aware access control and authentication mechanisms, cryptographic protocols that account for device\u2019s resource constraints, privacy-preserving mechanisms, and trust mechanisms for wireless ad hoc<\/jats:italic> and sensor networks.<\/jats:p>\n<\/jats:sec>\n\nOriginality\/value<\/jats:title>\nTo the best of our knowledge, this is the first SLR on security challenges in ubicomp. The findings should serve as a reference to an extensive list of scientific contributions, as well as a guiding point for the researchers\u2019 novel to the security research in ubicomp.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-03-2016-0018","type":"journal-article","created":{"date-parts":[[2016,5,31]],"date-time":"2016-05-31T12:08:58Z","timestamp":1464696538000},"page":"216-259","source":"Crossref","is-referenced-by-count":5,"title":["A decade of security research in ubiquitous computing: results of a systematic literature review"],"prefix":"10.1108","volume":"12","author":[{"given":"Ema","family":"Kusen","sequence":"first","affiliation":[]},{"given":"Mark","family":"Strembeck","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"8","key":"key2020121504000300700_ref001","first-page":"1545","article-title":"A new multiple service key management scheme for secure wireless mobile multicast","volume":"14","year":"2014","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"key2020121504000300700_ref002","first-page":"30","article-title":"IMAPS: Imbricated authentication protocol suite for mobile users and groups","year":"2009"},{"issue":"6","key":"key2020121504000300700_ref003","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1016\/j.infsof.2008.12.005","article-title":"A systematic review of search-based testing for non-functional system properties","volume":"51","year":"2009","journal-title":"Information and Software Technology"},{"key":"key2020121504000300700_ref004","first-page":"117","article-title":"A privacy-aware continuous authentication scheme for proximity-based access control","volume-title":"Computers & Security","year":"2013"},{"key":"key2020121504000300700_ref005","first-page":"1","article-title":"Privacy challenges in context-sensitive access control for pervasive computing environment","year":"2007"},{"issue":"2","key":"key2020121504000300700_ref008","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1016\/j.jss.2009.09.040","article-title":"Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments","volume":"83","year":"2010","journal-title":"Journal of Systems and Software"},{"issue":"10","key":"key2020121504000300700_ref007","doi-asserted-by":"crossref","first-page":"1657","DOI":"10.1016\/j.jss.2009.03.020","article-title":"Design and implementation of S-MARKS: a secure middleware for pervasive computing applications","volume":"82","year":"2009","journal-title":"Journal of Systems and Software"},{"key":"key2020121504000300700_ref006","first-page":"590","article-title":"A Risk-aware Trust Based Secure Resource Discovery (RTSRD) model for pervasive computing","year":"2008"},{"key":"key2020121504000300700_ref009","first-page":"391","article-title":"Checksum gestures: continuous gestures as an out-of-band channel for secure pairing","year":"2015"},{"key":"key2020121504000300700_ref010","first-page":"603","article-title":"Incremental trust: building trust from past experience","year":"2005"},{"issue":"3","key":"key2020121504000300700_ref011","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","article-title":"Security and privacy in electronic health records: a systematic literature review","volume":"46","year":"2013","journal-title":"Journal of Biomedical Informatics"},{"key":"key2020121504000300700_ref012","first-page":"531","article-title":"A trust-based middleware for providing security to Ad-Hoc Peer-to-Peer applications","year":"2008"},{"key":"key2020121504000300700_ref013","first-page":"489","article-title":"Cerberus: a context-aware security scheme for smart spaces","year":"2003"},{"key":"key2020121504000300700_ref014","first-page":"205","article-title":"New privacy issues in mobile telephony: fix and verification","year":"2012"},{"issue":"56","key":"key2020121504000300700_ref015","first-page":"1313","article-title":"Anonymously accessing JXTA community services through split message forwarding","volume":"58","year":"2013","journal-title":"Mathematical and Computer Modelling"},{"key":"key2020121504000300700_ref016","first-page":"271","article-title":"ADSNARK: nearly practical and privacy-preserving proofs on authenticated data","year":"2015"},{"issue":"6","key":"key2020121504000300700_ref017","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1145\/508448.508475","article-title":"Toward open, secure, widely distributed services","volume":"45","year":"2002","journal-title":"Communications of the ACM"},{"issue":"4","key":"key2020121504000300700_ref018","first-page":"375","article-title":"Access control and trust in the use of widely distributed services","volume":"33","year":"2003","journal-title":"Software: Practice and Experience"},{"issue":"1","key":"key2020121504000300700_ref019","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1016\/j.jnca.2011.10.002","article-title":"Extracting trust information from security system of a service","volume":"35","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"key":"key2020121504000300700_ref020","first-page":"863","article-title":"Design and evaluation of an architecture for ubiquitous user authentication based on identity management systems","year":"2011"},{"issue":"C","key":"key2020121504000300700_ref021","first-page":"66","article-title":"Ubiquitous iris recognition by means of mobile devices","volume":"57","year":"2015","journal-title":"Pattern Recognition Letters"},{"key":"key2020121504000300700_ref022","first-page":"319","article-title":"Personal servers as digital keys","year":"2004"},{"key":"key2020121504000300700_ref023","volume-title":"Distributed Systems Security: Issues, Processes, and Solutions","year":"2009"},{"issue":"1","key":"key2020121504000300700_ref024","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s00779-012-0618-y","article-title":"A k-anonymity privacy-preserving approach in wireless medical monitoring environments","volume":"18","year":"2014","journal-title":"Personal and Ubiquitous Computing"},{"issue":"B","key":"key2020121504000300700_ref025","first-page":"351","article-title":"Trust management system design for the internet of things: a context-aware and multi-service approach","volume":"39","year":"2013","journal-title":"Computers & Security"},{"key":"key2020121504000300700_ref026","first-page":"164","article-title":"Decentralized Trust Management","year":"1996"},{"issue":"18","key":"key2020121504000300700_ref027","doi-asserted-by":"crossref","first-page":"4343","DOI":"10.1016\/j.comcom.2008.05.007","article-title":"A trust-based security system for ubiquitous and pervasive computing environments","volume":"31","year":"2008","journal-title":"Computer Communications"},{"issue":"4","key":"key2020121504000300700_ref028","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/JSAC.2009.090504","article-title":"A secure mobile healthcare system using trust-based multicast scheme","volume":"27","year":"2009","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"key2020121504000300700_ref029","first-page":"103","article-title":"Privacy preservation for participatory sensing data","year":"2013"},{"issue":"1","key":"key2020121504000300700_ref030","first-page":"194","article-title":"Secure event logging in sensor networks","volume":"7163","year":"2012","journal-title":"Lecture Notes in Computer Science: Public Key Infrastructures, Services and Applications"},{"issue":"4","key":"key2020121504000300700_ref031","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1513601.1513603","article-title":"universally composable rfid identification and authentication protocols","volume":"12","year":"2009","journal-title":"ACM Transactions on Information and System Security"},{"key":"key2020121504000300700_ref032","first-page":"172","article-title":"Soft authentication with low-cost signatures","year":"2014"},{"issue":"19","key":"key2020121504000300700_ref033","doi-asserted-by":"crossref","first-page":"3995","DOI":"10.1016\/j.ins.2007.03.024","article-title":"EC2C-PAKA: An efficient client-to-client password-authenticated key agreement","volume":"177","year":"2007","journal-title":"Information Sciences"},{"issue":"3","key":"key2020121504000300700_ref034","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MPRV.2003.1228527","article-title":"Using trust for secure collaboration in uncertain environments","volume":"2","year":"2003","journal-title":"IEEE Pervasive Computing"},{"issue":"5","key":"key2020121504000300700_ref035","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1007\/s00779-011-0415-z","article-title":"Personalization and user verification in wearable systems using biometric walking patterns","volume":"16","year":"2012","journal-title":"Personal and Ubiquitous Computing"},{"issue":"5","key":"key2020121504000300700_ref037","doi-asserted-by":"crossref","first-page":"738","DOI":"10.1007\/s11036-011-0329-z","article-title":"Ubiquitous one-time password service using the generic authentication architecture","volume":"18","year":"2013","journal-title":"Mobile Networks and Applications"},{"key":"key2020121504000300700_ref036","first-page":"92","article-title":"GAnGS: gather, authenticate \u2019N Group Securely","year":"2008"},{"key":"key2020121504000300700_ref038","first-page":"172","article-title":"Pandaka: a lightweight cipher for RFID systems","year":"2014"},{"issue":"18","key":"key2020121504000300700_ref039","doi-asserted-by":"crossref","first-page":"4352","DOI":"10.1016\/j.comcom.2008.03.024","article-title":"A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks","volume":"31","year":"2008","journal-title":"Computer Communications"},{"issue":"4","key":"key2020121504000300700_ref040","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","article-title":"SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity","volume":"4","year":"2007","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"key2020121504000300700_ref041","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1007\/s11276-008-0135-0","article-title":"A context-constrained authorisation (CoCoA) framework for pervasive grid computing","volume":"16","year":"2010","journal-title":"Wireless Networks"},{"key":"key2020121504000300700_ref042","first-page":"93","article-title":"Multi-resolution elliptic curve digital signature","year":"2012"},{"issue":"12","key":"key2020121504000300700_ref043","doi-asserted-by":"crossref","first-page":"2596","DOI":"10.1002\/asi.23356","article-title":"Smartphone-based public health information systems: anonymity, privacy and intervention","volume":"66","year":"2015","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1\/3","key":"key2020121504000300700_ref044","first-page":"203","article-title":"Role-based access control for boxed ambients","volume":"398","year":"2008","journal-title":"Theoretical Computer Science"},{"key":"key2020121504000300700_ref045","first-page":"253","article-title":"Context-based access control management in ubiquitous environments","year":"2004"},{"issue":"1","key":"key2020121504000300700_ref046","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MCE.2014.2361266","article-title":"A Moore\u2019s law for mobile energy: improving upon conventional batteries and energy sources for mobile devices","volume":"4","year":"2015","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"key2020121504000300700_ref047","volume-title":"Distributed Systems: Concepts and Design","year":"2011","edition":"5th ed."},{"issue":"1","key":"key2020121504000300700_ref048","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1210263.1210265","article-title":"GEO-RBAC: a spatially aware RBAC","volume":"10","year":"2007","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"key2020121504000300700_ref049","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/TDSC.2011.57","article-title":"Securedtrust: a dynamic trust computation model for secured communication in multiagent systems","volume":"9","year":"2012","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"1","key":"key2020121504000300700_ref050","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MPRV.2015.13","article-title":"Security and privacy implications of pervasive memory augmentation","volume":"14","year":"2015","journal-title":"IEEE Pervasive Computing"},{"issue":"12","key":"key2020121504000300700_ref051","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1016\/j.imavis.2013.12.014","article-title":"FIRME: face and iris recognition for mobile engagement","volume":"32","year":"2014","journal-title":"Image and Vision Computing"},{"key":"key2020121504000300700_ref052","first-page":"1","article-title":"Proximity as a security property in a mobile enterprise application context","year":"2004"},{"issue":"3","key":"key2020121504000300700_ref053","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","article-title":"Trust management in ubiquitous computing: a Bayesian approach","volume":"34","year":"2011","journal-title":"Computer Communications"},{"key":"key2020121504000300700_ref054","first-page":"1","article-title":"A secure and efficient RFID protocol that could make Big Brother (partially) obsolete","year":"2006"},{"issue":"3","key":"key2020121504000300700_ref055","first-page":"1","article-title":"Vehicle authentication via monolithically certified public key and attributes","volume":"22","year":"2015","journal-title":"Wireless Networks"},{"key":"key2020121504000300700_ref056","first-page":"159","article-title":"SACM: stateful access control model","year":"2011"},{"key":"key2020121504000300700_ref057","first-page":"2577","article-title":"The analysis of pen inputs of handwritten symbols using self organizing maps and its application to user authentication","year":"2006"},{"issue":"7","key":"key2020121504000300700_ref058","doi-asserted-by":"crossref","first-page":"566","DOI":"10.1016\/j.cose.2009.06.005","article-title":"What the Heck is this application doing? A security-by-contract architecture for pervasive services","volume":"28","year":"2009","journal-title":"Computers and Security"},{"key":"key2020121504000300700_ref059","first-page":"78","article-title":"A hybrid authentication and key establishment scheme for WBAN","year":"2012"},{"key":"key2020121504000300700_ref060","first-page":"152","article-title":"A formal model of obfuscation and negotiation for location privacy","year":"2005"},{"key":"key2020121504000300700_ref061","first-page":"178","article-title":"Strength of evidence in systematic reviews in software engineering","year":"2008"},{"issue":"6","key":"key2020121504000300700_ref062","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1109\/MDT.2007.178","article-title":"A survey of lightweight-cryptography implementations","volume":"24","year":"2007","journal-title":"IEEE Design and Test of Computers"},{"issue":"5","key":"key2020121504000300700_ref063","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1007\/s00779-012-0548-8","article-title":"Trust-based authentication scheme with user rating for low-resource devices in smart environments","volume":"17","year":"2013","journal-title":"Personal and Ubiquitous Computing"},{"key":"key2020121504000300700_ref064","first-page":"235","article-title":"On lightweight mobile phone application certification","year":"2009"},{"issue":"4","key":"key2020121504000300700_ref065","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/s10707-015-0228-8","article-title":"The CASE histogram: privacy-aware processing of trajectory data using aggregates","volume":"19","year":"2015","journal-title":"GeoInformatica"},{"key":"key2020121504000300700_ref066","first-page":"736","article-title":"Portable Personal identity provider in mobile phones","year":"2013"},{"issue":"7","key":"key2020121504000300700_ref067","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1016\/j.infsof.2012.12.006","article-title":"Empirical studies concerning the maintenance of UML diagrams and their use in the maintenance of code: a systematic mapping study","volume":"55","year":"2013","journal-title":"Information and Software Technology"},{"issue":"2","key":"key2020121504000300700_ref068","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/TDSC.2012.85","article-title":"Non-cooperative location privacy","volume":"10","year":"2013","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"key2020121504000300700_ref069","first-page":"1","article-title":"A coordinated spatio-temporal access control model for mobile computing in coalition environments","year":"2005"},{"key":"key2020121504000300700_ref070","first-page":"1","article-title":"PROPS: a privacy-preserving location proof system","year":"2014"},{"issue":"2","key":"key2020121504000300700_ref071","first-page":"103","article-title":"Software process modeling languages: a systematic literature review","volume":"56","year":"2013","journal-title":"Information and Software Technology"},{"key":"key2020121504000300700_ref072","first-page":"1","article-title":"Security for pervasive medical sensor networks","year":"2009"},{"issue":"1","key":"key2020121504000300700_ref073","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TMC.2007.1062","article-title":"Protecting location privacy with personalized k-anonymity: architecture and algorithms","volume":"7","year":"2008","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"key2020121504000300700_ref074","first-page":"144","article-title":"Enhancing privacy in participatory sensing applications with multidimensional data","year":"2012"},{"key":"key2020121504000300700_ref075","first-page":"247","article-title":"Sizzle: a standards-based end-to-end security architecture for the embedded Internet","year":"2005"},{"issue":"1","key":"key2020121504000300700_ref076","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.cose.2004.06.011","article-title":"A taxonomy of network and computer attacks","volume":"24","year":"2005","journal-title":"Computers and Security"},{"key":"key2020121504000300700_ref077","first-page":"559","article-title":"Protecting privacy for group nearest neighbor queries with crowdsourced data and computing","year":"2013"},{"issue":"1","key":"key2020121504000300700_ref079","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1109\/JBHI.2013.2268897","article-title":"A novel and lightweight system to secure wireless medical sensor networks","volume":"18","year":"2014","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"2","key":"key2020121504000300700_ref080","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1109\/JBHI.2013.2293620","article-title":"Lightweight and confidential data discovery and dissemination for wireless body area networks","volume":"18","year":"2014","journal-title":"IEEE Journal of Biomedical and Health Informatics"},{"issue":"1","key":"key2020121504000300700_ref078","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MCOM.2015.7010518","article-title":"Authentication protocol for an ambient assisted living system","volume":"53","year":"2015","journal-title":"IEEE Communications Magazine"},{"issue":"5","key":"key2020121504000300700_ref081","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1109\/MCOM.2004.1299356","article-title":"The quest for personal control over mobile location privacy","volume":"42","year":"2004","journal-title":"IEEE Communications Magazine"},{"key":"key2020121504000300700_ref082","first-page":"201","article-title":"SMOCK: a self-contained public key management scheme for mission-critical wireless ad hoc networks","year":"2007"},{"issue":"4","key":"key2020121504000300700_ref083","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1145\/1108906.1108910","article-title":"Access control to people location information","volume":"8","year":"2005","journal-title":"ACM Transactions on Information and System Security"},{"key":"key2020121504000300700_ref084","first-page":"222","article-title":"Avoiding privacy violations caused by context-sensitive services","year":"2006"},{"key":"key2020121504000300700_ref085","first-page":"50","article-title":"Providing security and privacy in rfid systems using triggered hash chains","year":"2008"},{"key":"key2020121504000300700_ref086","first-page":"294","article-title":"A context-aware data management system for ubiquitous computing applications","year":"2003"},{"issue":"1","key":"key2020121504000300700_ref087","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s00779-012-0631-1","article-title":"Incorporating behavioral trust theory into system development for ubiquitous applications","volume":"18","year":"2014","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2","key":"key2020121504000300700_ref088","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/MPRV.2009.33","article-title":"Opentag: privacy protection for RFID","volume":"8","year":"2009","journal-title":"IEEE Pervasive Computing"},{"key":"key2020121504000300700_ref089","first-page":"1","article-title":"An adaptive initial trust and demand aware secure resource discovery (AID-SRD) model for pervasive environments","year":"2009"},{"key":"key2020121504000300700_ref090","first-page":"102","article-title":"AnonPri: an efficient anonymous private authentication protocol","year":"2011"},{"key":"key2020121504000300700_ref091","first-page":"639","article-title":"These aren\u2019t the Droids you\u2019re looking for: retrofitting Android to protect data from imperious applications","year":"2011"},{"issue":"10","key":"key2020121504000300700_ref092","doi-asserted-by":"crossref","first-page":"995","DOI":"10.1002\/wcm.2252","article-title":"Anonymous authentication protocol based on elliptic curve Diffie-Hellman for wireless access networks","volume":"14","year":"2014","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"9","key":"key2020121504000300700_ref093","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/JSAC.2013.SUP.0513004","article-title":"Body Area network security: a fuzzy attribute-based signcryption scheme","volume":"31","year":"2013","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"key2020121504000300700_ref094","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.csi.2007.10.011","article-title":"Efficient migration for mobile computing in distributed networks","volume":"31","year":"2009","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"key2020121504000300700_ref095","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1109\/JSAC.2009.090505","article-title":"Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks","volume":"27","year":"2009","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"key2020121504000300700_ref096","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10458-005-6825-4","article-title":"An integrated trust and reputation model for open multi-agent systems","volume":"13","year":"2006","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"key2020121504000300700_ref097","first-page":"1009","article-title":"prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world","year":"2006"},{"issue":"1","key":"key2020121504000300700_ref098","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/COMST.2008.4483667","article-title":"taxonomies of attacks and vulnerabilities in computer systems","volume":"10","year":"2008","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"4","key":"key2020121504000300700_ref099","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/MPRV.2014.74","article-title":"Smartphones: past, present, and future","volume":"13","year":"2014","journal-title":"IEEE Pervasive Computing"},{"issue":"1","key":"key2020121504000300700_ref100","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/TCE.2008.4470031","article-title":"Viewer Identification and authentication in IPTV using RFID technique","volume":"54","year":"2008","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"key2020121504000300700_ref101","first-page":"29","article-title":"Systematic literature studies: database searches vs backward snowballing","year":"2012"},{"key":"key2020121504000300700_ref102","first-page":"349","article-title":"A scanner darkly: protecting user privacy from perceptual applications","year":"2013"},{"issue":"2","key":"key2020121504000300700_ref103","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1002\/wcm.884","article-title":"Hybrid security protocol for wireless body area networks","volume":"11","year":"2011","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"9","key":"key2020121504000300700_ref104","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/JSAC.2013.SUP.0513005","article-title":"Interconnection framework for mhealth and remote monitoring based on the internet of things","volume":"31","year":"2013","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"key2020121504000300700_ref105","first-page":"1","article-title":"A Security architecture for personal networks","year":"2006"},{"key":"key2020121504000300700_ref106","first-page":"103","article-title":"The blocker tag: selective blocking of RFID tags for consumer privacy","year":"2003"},{"issue":"18","key":"key2020121504000300700_ref107","doi-asserted-by":"crossref","first-page":"4248","DOI":"10.1016\/j.comcom.2008.05.006","article-title":"A study on secure RFID mutual authentication scheme in pervasive computing environment","volume":"31","year":"2008","journal-title":"Computer Communications"},{"issue":"2","key":"key2020121504000300700_ref108","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MC.2007.52","article-title":"Cryptography on a speck of dust","volume":"40","year":"2007","journal-title":"Computer"},{"issue":"3","key":"key2020121504000300700_ref109","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.amepre.2012.11.006","article-title":"An ethical framework for automated, wearable cameras in health behavior research","volume":"44","year":"2013","journal-title":"American Journal of Preventive Medicine"},{"key":"key2020121504000300700_ref110","first-page":"1","article-title":"Securing body sensor networks: Sensor association and key management","year":"2009"},{"issue":"2","key":"key2020121504000300700_ref111","doi-asserted-by":"crossref","first-page":"516","DOI":"10.1109\/TCE.2011.5955187","article-title":"An efficient and scalable re-authentication protocol over wireless sensor network","volume":"57","year":"2011","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"key2020121504000300700_ref112","first-page":"507","article-title":"Effects of contextual properties on users\u2019 privacy preferences in mobile computing environments","year":"2015"},{"key":"key2020121504000300700_ref113","first-page":"115","article-title":"Authenticating ubiquitous services: a study of wireless hotspot access","year":"2009"},{"issue":"12","key":"key2020121504000300700_ref114","doi-asserted-by":"crossref","first-page":"2049","DOI":"10.1016\/j.infsof.2013.07.010","article-title":"A systematic review of systematic review process research in software engineering","volume":"55","year":"2013","journal-title":"Information and Software Technology"},{"key":"key2020121504000300700_ref115","unstructured":"Kitchenham, B. and Charters, S. (2007), \u201cGuidelines for performing systematic literature reviews in software engineering\u201d, EBSE Technical Report, Vol. 2 No. 3."},{"key":"key2020121504000300700_ref116","first-page":"10","article-title":"PIP: privacy and integrity preserving data aggregation in wireless sensor networks","year":"2013"},{"issue":"1","key":"key2020121504000300700_ref117","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.dss.2010.08.002","article-title":"A pervasive P3P-based negotiation mechanism for privacy-aware pervasive e-commerce","volume":"50","year":"2010","journal-title":"Decision Support Systems"},{"key":"key2020121504000300700_ref118","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.cose.2013.12.001","article-title":"TinyLock: affordable defense against smudge attacks on smartphone pattern lock systems","volume":"42","year":"2014","journal-title":"Computers & Security"},{"key":"key2020121504000300700_ref119","first-page":"486","article-title":"A novel utility and game-theoretic based security mechanism for mobile P2P systems","year":"2008"},{"issue":"18","key":"key2020121504000300700_ref120","doi-asserted-by":"crossref","first-page":"2052","DOI":"10.1016\/S0140-3664(03)00188-9","article-title":"Lightweight security for mobile commerce transactions","volume":"26","year":"2003","journal-title":"Computer Communications"},{"issue":"16","key":"key2020121504000300700_ref121","doi-asserted-by":"crossref","first-page":"2979","DOI":"10.1016\/j.ins.2010.04.020","article-title":"Activity-oriented access control to ubiquitous hospital information and services","volume":"180","year":"2010","journal-title":"Information Sciences"},{"key":"key2020121504000300700_ref122","first-page":"1","article-title":"A lightweight protocol based on the ssl protocol for handheld devices","year":"2011"},{"issue":"7","key":"key2020121504000300700_ref123","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1007\/s11276-011-0371-6","article-title":"Access stratum resource management for reliable u-healthcare service in LTE networks","volume":"17","year":"2011","journal-title":"Wireless Networks"},{"issue":"7","key":"key2020121504000300700_ref124","doi-asserted-by":"crossref","first-page":"5192","DOI":"10.1016\/j.eswa.2009.12.072","article-title":"An index-based privacy preserving service trigger in context-aware computing environments","volume":"37","year":"2010","journal-title":"Expert Systems with Applications"},{"issue":"18","key":"key2020121504000300700_ref125","doi-asserted-by":"crossref","first-page":"4367","DOI":"10.1016\/j.comcom.2008.05.005","article-title":"Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing","volume":"31","year":"2008","journal-title":"Computer Communications"},{"issue":"3","key":"key2020121504000300700_ref126","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.infsof.2013.12.004","article-title":"A systematic review on security in process-aware information systems: constitution, challenges, and future directions","volume":"56","year":"2014","journal-title":"Information and Software Technology"},{"issue":"4","key":"key2020121504000300700_ref127","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MPRV.2007.78","article-title":"Palmprint verification for controlling access to shared computing resources","volume":"6","year":"2007","journal-title":"IEEE Pervasive Computing"},{"key":"key2020121504000300700_ref128","first-page":"639","article-title":"Establishing a trusted architecture on pervasive terminals for securing context processing","year":"2008"},{"issue":"4","key":"key2020121504000300700_ref129","doi-asserted-by":"crossref","first-page":"1133","DOI":"10.1007\/s11071-013-1029-y","article-title":"An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments","volume":"74","year":"2013","journal-title":"Nonlinear Dynamics"},{"issue":"2","key":"key2020121504000300700_ref130","first-page":"18:1","article-title":"Secure Ad Hoc trust initialization and key management in wireless body area networks","volume":"9","year":"2013","journal-title":"ACM Transactions on Sensor Networks"},{"key":"key2020121504000300700_ref131","first-page":"76","article-title":"providing privacy-aware incentives for mobile sensing","year":"2013"},{"issue":"18","key":"key2020121504000300700_ref132","doi-asserted-by":"crossref","first-page":"4360","DOI":"10.1016\/j.comcom.2008.05.008","article-title":"A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services","volume":"31","year":"2008","journal-title":"Computer Communications"},{"issue":"7","key":"key2020121504000300700_ref133","doi-asserted-by":"crossref","first-page":"1321","DOI":"10.1109\/TPDS.2012.218","article-title":"Grouping-proofs-based authentication protocol for distributed RFID systems","volume":"24","year":"2013","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"key2020121504000300700_ref134","first-page":"1","article-title":"an incentive compatible reputation mechanism for ubiquitous computing environments","year":"2006"},{"issue":"6","key":"key2020121504000300700_ref135","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1007\/s11036-010-0254-6","article-title":"Temporal Accountability and anonymity in medical sensor networks","volume":"16","year":"2011","journal-title":"Mobile Networks and Applications"},{"issue":"5","key":"key2020121504000300700_ref136","doi-asserted-by":"crossref","first-page":"2559","DOI":"10.1016\/j.eswa.2013.10.003","article-title":"Improvements on an authentication scheme for vehicular sensor networks","volume":"41","year":"2014","journal-title":"Expert Systems with Applications"},{"issue":"3","key":"key2020121504000300700_ref137","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1016\/j.jnca.2005.07.010","article-title":"A network access control approach based on the AAA architecture and authorization attributes","volume":"30","year":"2007","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"key2020121504000300700_ref138","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/TSC.2008.4","article-title":"Adaptive secure access to remote services in mobile environments","volume":"1","year":"2008","journal-title":"IEEE Transactions on Services Computing"},{"issue":"6","key":"key2020121504000300700_ref139","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1109\/TNET.2004.838598","article-title":"URSA: ubiquitous and robust access control for mobile Ad Hoc networks","volume":"12","year":"2004","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"key2020121504000300700_ref140","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1016\/j.datak.2005.06.003","article-title":"Masking page reference patterns in encryption databases on untrusted storage","volume":"58","year":"2006","journal-title":"Data & Knowledge Engineering"},{"issue":"2","key":"key2020121504000300700_ref141","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.infsof.2012.08.010","article-title":"Variability in quality attributes of service-based software systems: a systematic literature review","volume":"55","year":"2013","journal-title":"Information and Software Technology"},{"issue":"8","key":"key2020121504000300700_ref142","doi-asserted-by":"crossref","first-page":"6273","DOI":"10.3390\/s90806273","article-title":"Design and implementation of a secure wireless mote-based medical sensor network","volume":"9","year":"2009","journal-title":"Sensors"},{"key":"key2020121504000300700_ref143","first-page":"246","article-title":"SMILE: Encounter-based Trust for Mobile Social Services","year":"2009"},{"key":"key2020121504000300700_ref144","first-page":"128","article-title":"Radio-telepathy: extracting a secret key from an unauthenticated wireless channel","year":"2008"},{"key":"key2020121504000300700_ref145","first-page":"431","article-title":"Secure and efficient key derivation in portfolio authentication schemes using Blakley Secret sharing","year":"2015"},{"issue":"4","key":"key2020121504000300700_ref147","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1109\/TMC.2012.43","article-title":"UACAP: a unified auxiliary channel authentication protocol","volume":"12","year":"2013","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"key2020121504000300700_ref146","first-page":"199","article-title":"Security by spatial reference: using relative positioning to authenticate devices for spontaneous interaction","year":"2007"},{"issue":"4","key":"key2020121504000300700_ref148","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","article-title":"A systematic review of security requirements engineering","volume":"32","year":"2010","journal-title":"Computer Standards & Interfaces"},{"key":"key2020121504000300700_ref149","first-page":"345","article-title":"Hiding stars with fireworks: location privacy through camouflage","year":"2009"},{"key":"key2020121504000300700_ref150","first-page":"880","article-title":"Context-based zero-interaction pairing and key evolution for advanced personal devices","year":"2014"},{"key":"key2020121504000300700_ref151","first-page":"1","article-title":"Adaptive security architecture based on EC-MQV algorithm in Personal Network (PN)","year":"2007"},{"issue":"1","key":"key2020121504000300700_ref152","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.pmcj.2005.01.004","article-title":"Secure context-sensitive authorization","volume":"1","year":"2005","journal-title":"Pervasive and Mobile Computing"},{"key":"key2020121504000300700_ref153","first-page":"385","article-title":"A taxonomy for attacks on mobile agent","year":"2001"},{"issue":"1","key":"key2020121504000300700_ref154","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.comnet.2011.09.008","article-title":"Secure authentication scheme for passive C1G2 RFID tags","volume":"56","year":"2012","journal-title":"Computer Networks"},{"key":"key2020121504000300700_ref155","first-page":"1","article-title":"An XML based access control architecture for pervasive computing","year":"2009"},{"key":"key2020121504000300700_ref156","first-page":"682","article-title":"Privacy, security and trust in P2P environments: a perspective","year":"2006"},{"issue":"3","key":"key2020121504000300700_ref157","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.comcom.2010.06.010","article-title":"An AAA scheme using ID-based ticket with anonymity in future mobile communication","volume":"34","year":"2011","journal-title":"Computer Communications"},{"issue":"2","key":"key2020121504000300700_ref158","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jnca.2009.11.001","article-title":"Flexible and secure service discovery in ubiquitous computing","volume":"33","year":"2010","journal-title":"Journal of Network and Computer Applications"},{"key":"key2020121504000300700_ref159","first-page":"525","article-title":"Deniable Liaisons","year":"2014"},{"key":"key2020121504000300700_ref160","article-title":"A systematic review of model-driven security","year":"2013"},{"issue":"11","key":"key2020121504000300700_ref161","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1109\/TMC.2006.169","article-title":"Mobile device security using transient authentication","volume":"5","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"3","key":"key2020121504000300700_ref162","doi-asserted-by":"crossref","first-page":"657","DOI":"10.1109\/TPDS.2014.2311791","article-title":"Aggregated-proof based hierarchical authentication scheme for the internet of things","volume":"26","year":"2015","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"5","key":"key2020121504000300700_ref163","first-page":"607","article-title":"New role-based access control in ubiquitous e-business environment","volume":"21","year":"2008","journal-title":"Journal of Intelligent Manufacturing"},{"key":"key2020121504000300700_ref164","first-page":"354","article-title":"Caprice: a tool for engineering adaptive privacy","year":"2012"},{"key":"key2020121504000300700_ref166","first-page":"1","article-title":"Adaptive and context-aware privacy preservation schemes exploiting user interactions in pervasive environments","year":"2012"},{"key":"key2020121504000300700_ref165","first-page":"1","article-title":"Privacy infusion in ubiquitous computing","year":"2007"},{"key":"key2020121504000300700_ref167","first-page":"805","article-title":"CAPPA: context aware privacy protecting advertising: an extension to clopro framework","year":"2014"},{"issue":"6","key":"key2020121504000300700_ref168","doi-asserted-by":"crossref","first-page":"824","DOI":"10.1109\/TMC.2010.30","article-title":"Combined authentication-based multilevel access control in mobile application for dailylifeservice","volume":"9","year":"2010","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"6","key":"key2020121504000300700_ref169","doi-asserted-by":"crossref","first-page":"821","DOI":"10.1109\/TC.2008.36","article-title":"Computationally efficient PKI-based single sign-on protocol, PKASSO for mobile devices","volume":"57","year":"2008","journal-title":"IEEE Transactions on Computers"},{"issue":"6","key":"key2020121504000300700_ref170","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1007\/s00779-013-0739-y","article-title":"Dangerous Wi-Fi access point: Attacks to benign smartphone applications","volume":"18","year":"2014","journal-title":"Personal and Ubiquitous Computing"},{"key":"key2020121504000300700_ref171","first-page":"191","article-title":"Secure routing and intrusion detection in Ad Hoc networks","year":"2005"},{"issue":"9","key":"key2020121504000300700_ref172","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/903893.903897","article-title":"Security and privacy issues of handheld and wearable wireless devices","volume":"46","year":"2003","journal-title":"ACM Communications"},{"issue":"11","key":"key2020121504000300700_ref173","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1016\/j.comnet.2012.03.022","article-title":"A context-aware scheme for privacy-preserving location-based services","volume":"56","year":"2012","journal-title":"Computer Networks"},{"key":"key2020121504000300700_ref174","first-page":"653","article-title":"privacy and accountability for location-based aggregate statistics","year":"2011"},{"issue":"7","key":"key2020121504000300700_ref175","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1016\/j.jss.2011.02.005","article-title":"Dynamic deployment of context-aware access control policies for constrained security devices","volume":"84","year":"2011","journal-title":"Journal of Systems and Software"},{"issue":"5","key":"key2020121504000300700_ref176","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.jcss.2012.11.002","article-title":"Security-aware optimization for ubiquitous computing systems with SEAT graph approach","volume":"79","year":"2013","journal-title":"Journal of Computer and System Sciences"},{"issue":"5","key":"key2020121504000300700_ref177","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1016\/j.comcom.2011.07.008","article-title":"A distributed reputation and trust management scheme for mobile peer-to-peer networks","volume":"35","year":"2012","journal-title":"Computer Communications"},{"issue":"8","key":"key2020121504000300700_ref178","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1016\/j.infsof.2013.02.009","article-title":"Software fault prediction metrics: a systematic literature review","volume":"55","year":"2013","journal-title":"Information and Software Technology"},{"key":"key2020121504000300700_ref179","first-page":"191","article-title":"SensCrypt: a secure protocol for managing low power fitness trackers","year":"2014"},{"key":"key2020121504000300700_ref180","first-page":"410","article-title":"Proximity-based Access control for implantable medical devices","year":"2009"},{"issue":"1","key":"key2020121504000300700_ref181","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s10844-007-0049-9","article-title":"An interoperable context sensitive model of trust","volume":"32","year":"2009","journal-title":"Journal of Intelligent Information Systems"},{"issue":"4","key":"key2020121504000300700_ref182","doi-asserted-by":"crossref","first-page":"1373","DOI":"10.1109\/TVT.2006.877704","article-title":"A novel privacy preserving authentication and access control scheme for pervasive computing environments","volume":"55","year":"2006","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"18","key":"key2020121504000300700_ref183","doi-asserted-by":"crossref","first-page":"4269","DOI":"10.1016\/j.comcom.2008.05.043","article-title":"A unified security framework with three key management schemes for wireless sensor networks","volume":"31","year":"2008","journal-title":"Computer Communications"},{"issue":"5","key":"key2020121504000300700_ref184","first-page":"941","article-title":"Only play in your comfort zone: interaction methods for improving security awareness on mobile devices","volume":"19","year":"2015","journal-title":"Personal and Ubiquitous Computing"},{"issue":"5","key":"key2020121504000300700_ref185","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1016\/j.jnca.2010.03.028","article-title":"Adaptive security protocol selection for mobile computing","volume":"33","year":"2010","journal-title":"Journal of Network and Computer Applications"},{"key":"key2020121504000300700_ref186","first-page":"299","article-title":"DR-BACA: dynamic role based access control for android","year":"2013"},{"issue":"4","key":"key2020121504000300700_ref187","doi-asserted-by":"crossref","first-page":"969","DOI":"10.1007\/s11276-009-0182-1","article-title":"A cluster-based trust-aware routing protocol for mobile Ad Hoc networks","volume":"16","year":"2010","journal-title":"Wireless Networks"},{"issue":"B","key":"key2020121504000300700_ref188","first-page":"571","article-title":"Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol","volume":"259","year":"2014","journal-title":"Journal of Computational and Applied Mathematics"},{"issue":"1","key":"key2020121504000300700_ref189","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1145\/234313.234412","article-title":"Authentication, access control, and audit","volume":"28","year":"1996","journal-title":"ACM Computing Surveys"},{"issue":"12","key":"key2020121504000300700_ref190","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.1016\/j.infsof.2012.07.008","article-title":"Model-driven engineering as a new landscape for traceability management: a systematic literature review","volume":"54","year":"2012","journal-title":"Information and Software Technology"},{"key":"key2020121504000300700_ref191","first-page":"181","article-title":"Vibrate-to-unlock: Mobile phone assisted user authentication to multiple personal rfid tags","year":"2011"},{"key":"key2020121504000300700_ref192","first-page":"752","article-title":"Privacy context model for dynamic privacy adaptation in ubiquitous computing","year":"2012"},{"issue":"1","key":"key2020121504000300700_ref193","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MPRV.2015.5","article-title":"Context-adaptive privacy: leveraging context awareness to support privacy decision making","volume":"14","year":"2015","journal-title":"IEEE Pervasive Computing"},{"issue":"5","key":"key2020121504000300700_ref194","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1504\/IJWMC.2013.057387","article-title":"Modelling context-aware RBAC models for mobile business processes","volume":"6","year":"2013","journal-title":"International Journal of Wireless and Mobile Computing"},{"key":"key2020121504000300700_ref195","first-page":"775","article-title":"smudgesafe: geometric image transformations for smudge-resistant user authentication","year":"2014"},{"issue":"1","key":"key2020121504000300700_ref196","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.scico.2004.05.005","article-title":"The claim tool kit for ad hoc recognition of peer entities","volume":"54","year":"2005","journal-title":"Science of Computer Programming"},{"key":"key2020121504000300700_ref197","first-page":"39","article-title":"secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it","year":"2013"},{"issue":"6","key":"key2020121504000300700_ref198","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1023\/B:WINE.0000044030.65959.91","article-title":"Trust for ubiquitous, transparent collaboration","volume":"10","year":"2004","journal-title":"Wireless Networks"},{"issue":"6","key":"key2020121504000300700_ref200","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1016\/j.jnca.2012.07.004","article-title":"Efficient autonomous signature exchange on ubiquitous networks","volume":"35","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"key2020121504000300700_ref199","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/j.jnca.2010.11.002","article-title":"Achieving autonomous fair exchange in ubiquitous network settings","volume":"34","year":"2011","journal-title":"Journal of Network and Computer Applications"},{"key":"key2020121504000300700_ref201","first-page":"617","article-title":"Protecting location privacy: optimal strategy against localization attacks","year":"2012"},{"issue":"6","key":"key2020121504000300700_ref202","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1016\/j.comcom.2008.01.007","article-title":"A TTP-free protocol for location privacy in location-based services","volume":"31","year":"2008","journal-title":"Computer Communications"},{"key":"key2020121504000300700_ref203","first-page":"202","article-title":"Protecting your daily in-home activity information from a wireless snooping attack","year":"2008"},{"issue":"3","key":"key2020121504000300700_ref204","article-title":"An integrated approach to engineer and enforce context constraints in RBAC environments","volume":"7","year":"2004","journal-title":"ACM Transactions on Information and System Security"},{"issue":"6","key":"key2020121504000300700_ref205","first-page":"247","article-title":"Security and privacy in business processes: a posteriori analysis techniques","volume":"5","year":"2013","journal-title":"IT \u2013 Information Technology"},{"key":"key2020121504000300700_ref206","first-page":"333","article-title":"Don\u2019t bump, shake on it: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement","year":"2011"},{"key":"key2020121504000300700_ref207","first-page":"1012","article-title":"Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework","year":"2012"},{"issue":"6","key":"key2020121504000300700_ref208","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/j.pmcj.2007.06.002","article-title":"Securing distributed data storage and retrieval in sensor networks","volume":"3","year":"2007","journal-title":"Pervasive and Mobile Computing"},{"issue":"18","key":"key2020121504000300700_ref209","doi-asserted-by":"crossref","first-page":"4294","DOI":"10.1016\/j.comcom.2008.05.035","article-title":"Security co-existence of wireless sensor networks and RFID for pervasive computing","volume":"31","year":"2008","journal-title":"Computer Communications"},{"issue":"4","key":"key2020121504000300700_ref210","doi-asserted-by":"crossref","first-page":"1784","DOI":"10.1109\/TCE.2008.4711235","article-title":"A new design of wearable token system for mobile device security","volume":"54","year":"2008","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"key2020121504000300700_ref211","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ins.2015.01.037","article-title":"A provable authenticated group key agreement protocol for mobile environment","volume":"321","year":"2015","journal-title":"Information Sciences"},{"issue":"6","key":"key2020121504000300700_ref212","doi-asserted-by":"crossref","first-page":"1839","DOI":"10.1016\/j.jnca.2012.07.008","article-title":"A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments","volume":"35","year":"2012","journal-title":"Journal of Network and Computer Applications"},{"key":"key2020121504000300700_ref213","volume-title":"Distributed Systems: Principles and Paradigms","year":"2006","edition":"2nd ed."},{"key":"key2020121504000300700_ref214","first-page":"871","article-title":"Distilling privacy requirements for mobile applications","year":"2014"},{"issue":"3","key":"key2020121504000300700_ref215","doi-asserted-by":"crossref","first-page":"399","DOI":"10.3233\/JCS-2010-0418","article-title":"On the formalization and analysis of a Spatio-temporal role-based access control model","volume":"19","year":"2011","journal-title":"Journal of Computer Security"},{"issue":"1","key":"key2020121504000300700_ref216","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/s00779-012-0632-0","article-title":"Crowdsourcing privacy preferences in context-aware applications","volume":"18","year":"2014","journal-title":"Personal and Ubiquitous Computing"},{"issue":"11","key":"key2020121504000300700_ref217","doi-asserted-by":"crossref","first-page":"1947","DOI":"10.1016\/j.jss.2011.06.048","article-title":"Towards privacy-enhanced mobile communities architecture, concepts and user trials","volume":"84","year":"2011","journal-title":"Journal of Systems and Software"},{"issue":"2","key":"key2020121504000300700_ref218","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1023\/A:1022224912300","article-title":"A secure infrastructure for service discovery and access in pervasive computing","volume":"8","year":"2003","journal-title":"Mobile Networks and Applications"},{"issue":"3","key":"key2020121504000300700_ref219","doi-asserted-by":"crossref","first-page":"803","DOI":"10.1109\/TIFS.2011.2132129","article-title":"Probabilistic analysis of blocking attack in RFID systems","volume":"6","year":"2011","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"4","key":"key2020121504000300700_ref220","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1777406.1777410","article-title":"Physiological value-based efficient usable security solutions for body sensor networks","volume":"6","year":"2010","journal-title":"ACM Transactions on Sensor Networks"},{"key":"key2020121504000300700_ref221","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.comnet.2014.07.010","article-title":"On the anonymity of two-factor authentication schemes for wireless sensor networks: attacks, principle and solutions","volume":"73","year":"2014","journal-title":"Computer Networks"},{"issue":"8","key":"key2020121504000300700_ref222","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1016\/j.future.2007.07.011","article-title":"Access control management for ubiquitous computing","volume":"24","year":"2008","journal-title":"Future Generation Computer Systems"},{"issue":"10","key":"key2020121504000300700_ref223","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1016\/j.jss.2006.12.564","article-title":"A hierarchical key management scheme for secure group communications in mobile ad hoc networks","volume":"80","year":"2007","journal-title":"Journal of Systems and Software"},{"key":"key2020121504000300700_ref224","first-page":"2517","article-title":"ARTSense: anonymous reputation and trust in participatory sensing","year":"2013"},{"issue":"3","key":"key2020121504000300700_ref225","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.comcom.2010.04.005","article-title":"Robust authentication and key agreement scheme preserving the privacy of secret key","volume":"34","year":"2011","journal-title":"Computer Communications"},{"key":"key2020121504000300700_ref226","first-page":"635","article-title":"unauthorized origin crossing on mobile platforms: threats and mitigation","year":"2013"},{"issue":"4","key":"key2020121504000300700_ref227","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.csi.2005.03.004","article-title":"Byzantine agreement under dual failure mobile network","volume":"28","year":"2006","journal-title":"Computer Standards & Interfaces"},{"issue":"4","key":"key2020121504000300700_ref228","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MWC.2015.7224725","article-title":"Toward long-term quality of protection in mobile networks: a context-aware perspective","volume":"22","year":"2015","journal-title":"IEEE Wireless Communications"},{"issue":"3","key":"key2020121504000300700_ref229","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MPRV.2014.58","article-title":"The Power of smartphones","volume":"13","year":"2014","journal-title":"IEEE Pervasive Computing"},{"issue":"2","key":"key2020121504000300700_ref230","first-page":"13","article-title":"Analyzing the past to prepare for the future: writing a literature review","volume":"26","year":"2002","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2020121504000300700_ref231","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1023\/A:1022237215026","article-title":"Personal trusted devices for web services: revisiting multilevel security","volume":"8","year":"2003","journal-title":"Mobile Networks and Applications"},{"issue":"3","key":"key2020121504000300700_ref232","first-page":"66","article-title":"The computer for the 21st century","volume":"265","year":"1991","journal-title":"Scientific American"},{"issue":"4","key":"key2020121504000300700_ref233","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MWC.2015.7224726","article-title":"Privacy preserving RSS map generation for a crowdsensing network","volume":"22","year":"2015","journal-title":"IEEE Wireless Communications"},{"key":"key2020121504000300700_ref234","first-page":"26","article-title":"A taxonomy of network and computer attacks based on responses","year":"2011"},{"key":"key2020121504000300700_ref235","first-page":"189","article-title":"Location sharing preference: analysis and personalized recommendation","year":"2014"},{"key":"key2020121504000300700_ref236","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/wcm.2649","article-title":"A data privacy protective mechanism for wireless body area networks","year":"2015","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"3","key":"key2020121504000300700_ref237","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1109\/TPDS.2009.65","article-title":"Privacy-conscious location-based queries in mobile environments","volume":"21","year":"2010","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"6","key":"key2020121504000300700_ref238","first-page":"485","article-title":"TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications","volume":"16","year":"2012","journal-title":"Personal and Ubiquitous Computing"},{"key":"key2020121504000300700_ref239","first-page":"1","article-title":"Randomizing RFID private authentication","year":"2009"},{"key":"key2020121504000300700_ref240","first-page":"1","article-title":"A light-weight certificate-less public key cryptography scheme based on ECC","year":"2014"},{"issue":"9","key":"key2020121504000300700_ref241","first-page":"893","article-title":"Support for situation awareness in trustworthy ubiquitous computing application software","volume":"36","year":"2006","journal-title":"Journal of Software Practice and Engineering"},{"key":"key2020121504000300700_ref242","first-page":"2036","article-title":"Negative faceblurring: a privacy-by-design approach to visual lifelogging with google glass","year":"2014"},{"issue":"14","key":"key2020121504000300700_ref243","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.comcom.2010.03.026","article-title":"A secure and efficient SIP authentication scheme for converged VoIP networks","volume":"33","year":"2010","journal-title":"Computer Communications"},{"issue":"1","key":"key2020121504000300700_ref244","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/605434.605435","article-title":"Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation","volume":"6","year":"2003","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"key2020121504000300700_ref245","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1023\/A:1022281014117","article-title":"Bidirectional mobile code trust management using tamper resistant hardware","volume":"8","year":"2003","journal-title":"Mobile Networks and Applications"},{"issue":"5","key":"key2020121504000300700_ref246","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1023\/A:1024600519144","article-title":"Intrusion detection techniques for mobile wireless networks","volume":"9","year":"2003","journal-title":"Wireless Networks"},{"issue":"2","key":"key2020121504000300700_ref247","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s11036-005-4472-2","article-title":"Verifiable distributed oblivious transfer and mobile agent security","volume":"11","year":"2006","journal-title":"Mobile Networks and Applications"},{"issue":"15","key":"key2020121504000300700_ref248","doi-asserted-by":"crossref","first-page":"3643","DOI":"10.1016\/j.comcom.2008.06.013","article-title":"Balancing intrusion detection resources in ubiquitous computing networks","volume":"31","year":"2008","journal-title":"Computer Communications"},{"key":"key2020121504000300700_ref249","first-page":"235","article-title":"Splendor: a secure, private, and location-aware service discovery protocol supporting mobile services","year":"2003"},{"issue":"4","key":"key2020121504000300700_ref250","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TMC.2006.1599409","article-title":"A private, secure, and user-centric information exposure model for service discovery protocols","volume":"5","year":"2006","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"key2020121504000300700_ref251","first-page":"212","article-title":"The master key: a private authentication approach for pervasive computing environments","year":"2006"},{"issue":"11","key":"key2020121504000300700_ref252","doi-asserted-by":"crossref","first-page":"1565","DOI":"10.1109\/TPDS.2007.1075","article-title":"Private and secure service discovery via progressive and probabilistic exposure","volume":"18","year":"2007","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"key2020121504000300700_ref253","first-page":"1","article-title":"Understanding and minimizing identity exposure in ubiquitous computing environments","year":"2009"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IJPCC-03-2016-0018","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-03-2016-0018\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-03-2016-0018\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T04:02:26Z","timestamp":1608004946000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-03-2016-0018\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":253,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6,6]]}},"alternative-id":["10.1108\/IJPCC-03-2016-0018"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-03-2016-0018","relation":{},"ISSN":["1742-7371"],"issn-type":[{"value":"1742-7371","type":"print"}],"subject":[],"published":{"date-parts":[[2016,6,6]]}}}