{"id":"https://openalex.org/W2033011288","doi":"https://doi.org/10.1108/17427370580000132","title":"(Dis)trust certification model for large access in a pervasive environment","display_name":"(Dis)trust certification model for large access in a pervasive environment","publication_year":2005,"publication_date":"2005-11-01","ids":{"openalex":"https://openalex.org/W2033011288","doi":"https://doi.org/10.1108/17427370580000132","mag":"2033011288"},"language":"en","primary_location":{"id":"doi:10.1108/17427370580000132","is_oa":false,"landing_page_url":"https://doi.org/10.1108/17427370580000132","pdf_url":null,"source":{"id":"https://openalex.org/S172682790","display_name":"International Journal of Pervasive Computing and Communications","issn_l":"1742-7371","issn":["1742-7371","1742-738X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pervasive Computing and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064099312","display_name":"Rachid Saadi","orcid":null},"institutions":[{"id":"https://openalex.org/I48430043","display_name":"Institut National des Sciences Appliqu\u00e9es de Lyon","ror":"https://ror.org/050jn9y42","country_code":"FR","type":"education","lineage":["https://openalex.org/I203339264","https://openalex.org/I48430043"]},{"id":"https://openalex.org/I4210155607","display_name":"Laboratoire d'Informatique en Images et Syst\u00e8mes d'Information","ror":"https://ror.org/04dv4he91","country_code":"FR","type":"facility","lineage":["https://openalex.org/I100532134","https://openalex.org/I112936343","https://openalex.org/I1294671590","https://openalex.org/I188626449","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I4210155607","https://openalex.org/I48430043"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Rachid Saadi","raw_affiliation_strings":["LIRIS INSA de Lyon, Lyon, France","(LIRIS INSA de Lyon, Lyon, France)"],"affiliations":[{"raw_affiliation_string":"LIRIS INSA de Lyon, Lyon, France","institution_ids":["https://openalex.org/I48430043","https://openalex.org/I4210155607"]},{"raw_affiliation_string":"(LIRIS INSA de Lyon, Lyon, France)","institution_ids":["https://openalex.org/I48430043"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078199531","display_name":"Jean\u2010Marc Pierson","orcid":"https://orcid.org/0000-0001-8948-0474"},"institutions":[{"id":"https://openalex.org/I48430043","display_name":"Institut National des Sciences Appliqu\u00e9es de Lyon","ror":"https://ror.org/050jn9y42","country_code":"FR","type":"education","lineage":["https://openalex.org/I203339264","https://openalex.org/I48430043"]},{"id":"https://openalex.org/I4210155607","display_name":"Laboratoire d'Informatique en Images et Syst\u00e8mes d'Information","ror":"https://ror.org/04dv4he91","country_code":"FR","type":"facility","lineage":["https://openalex.org/I100532134","https://openalex.org/I112936343","https://openalex.org/I1294671590","https://openalex.org/I188626449","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I4210155607","https://openalex.org/I48430043"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean\u2010Marc Pierson","raw_affiliation_strings":["LIRIS INSA de Lyon, Lyon, France","Laboratoire d'InfoRmatique en Image et Syst\u00e8mes d'information"],"affiliations":[{"raw_affiliation_string":"LIRIS INSA de Lyon, Lyon, France","institution_ids":["https://openalex.org/I48430043","https://openalex.org/I4210155607"]},{"raw_affiliation_string":"Laboratoire d'InfoRmatique en Image et Syst\u00e8mes d'information","institution_ids":["https://openalex.org/I4210155607"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113435027","display_name":"Lionel Brunie","orcid":null},"institutions":[{"id":"https://openalex.org/I48430043","display_name":"Institut National des Sciences Appliqu\u00e9es de Lyon","ror":"https://ror.org/050jn9y42","country_code":"FR","type":"education","lineage":["https://openalex.org/I203339264","https://openalex.org/I48430043"]},{"id":"https://openalex.org/I4210155607","display_name":"Laboratoire d'Informatique en Images et Syst\u00e8mes d'Information","ror":"https://ror.org/04dv4he91","country_code":"FR","type":"facility","lineage":["https://openalex.org/I100532134","https://openalex.org/I112936343","https://openalex.org/I1294671590","https://openalex.org/I188626449","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I203339264","https://openalex.org/I4210155607","https://openalex.org/I48430043"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Lionel Brunie","raw_affiliation_strings":["LIRIS INSA de Lyon, Lyon, France","Laboratoire d'InfoRmatique en Image et Syst\u00e8mes d'information"],"affiliations":[{"raw_affiliation_string":"LIRIS INSA de Lyon, Lyon, France","institution_ids":["https://openalex.org/I48430043","https://openalex.org/I4210155607"]},{"raw_affiliation_string":"Laboratoire d'InfoRmatique en Image et Syst\u00e8mes d'information","institution_ids":["https://openalex.org/I4210155607"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064099312"],"corresponding_institution_ids":["https://openalex.org/I4210155607","https://openalex.org/I48430043"],"apc_list":null,"apc_paid":null,"fwci":7.9608,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.9676274,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"1","issue":"4","first_page":"289","last_page":"299"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13471","display_name":"Cognitive Functions and Memory","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/3205","display_name":"Experimental and Cognitive Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8114420771598816},{"id":"https://openalex.org/keywords/distrust","display_name":"Distrust","score":0.6699546575546265},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5822407603263855},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.5779101848602295},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5737084746360779},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.5505804419517517},{"id":"https://openalex.org/keywords/trusted-network-connect","display_name":"Trusted Network Connect","score":0.5240209698677063},{"id":"https://openalex.org/keywords/web-of-trust","display_name":"Web of trust","score":0.5183471441268921},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5170541405677795},{"id":"https://openalex.org/keywords/certificate-authority","display_name":"Certificate authority","score":0.4796757698059082},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.4695841670036316},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.450946569442749},{"id":"https://openalex.org/keywords/certification","display_name":"Certification","score":0.41830307245254517},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.41082024574279785},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4066014885902405},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39204972982406616},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.19063982367515564},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.15293601155281067}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8114420771598816},{"id":"https://openalex.org/C2778321746","wikidata":"https://www.wikidata.org/wiki/Q621922","display_name":"Distrust","level":2,"score":0.6699546575546265},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5822407603263855},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.5779101848602295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5737084746360779},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.5505804419517517},{"id":"https://openalex.org/C206149592","wikidata":"https://www.wikidata.org/wiki/Q3999882","display_name":"Trusted Network Connect","level":3,"score":0.5240209698677063},{"id":"https://openalex.org/C157424077","wikidata":"https://www.wikidata.org/wiki/Q1928707","display_name":"Web of trust","level":4,"score":0.5183471441268921},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5170541405677795},{"id":"https://openalex.org/C93636275","wikidata":"https://www.wikidata.org/wiki/Q196776","display_name":"Certificate authority","level":4,"score":0.4796757698059082},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.4695841670036316},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.450946569442749},{"id":"https://openalex.org/C46304622","wikidata":"https://www.wikidata.org/wiki/Q374814","display_name":"Certification","level":2,"score":0.41830307245254517},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.41082024574279785},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4066014885902405},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39204972982406616},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.19063982367515564},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.15293601155281067},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/17427370580000132","is_oa":false,"landing_page_url":"https://doi.org/10.1108/17427370580000132","pdf_url":null,"source":{"id":"https://openalex.org/S172682790","display_name":"International Journal of Pervasive Computing and Communications","issn_l":"1742-7371","issn":["1742-7371","1742-738X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Pervasive Computing and Communications","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.543.3151","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.543.3151","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://liris.cnrs.fr/Documents/Liris-2288.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-01584983v1","is_oa":false,"landing_page_url":"https://hal.science/hal-01584983","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Pervasive Computing and Communications, 2005, 1, pp.289-299. &#x27E8;10.1108/17427370580000132&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W193924643","https://openalex.org/W1484308061","https://openalex.org/W1505128236","https://openalex.org/W1531219431","https://openalex.org/W1536489637","https://openalex.org/W1583947982","https://openalex.org/W2026155725","https://openalex.org/W2053741629","https://openalex.org/W2100107987","https://openalex.org/W2133884536","https://openalex.org/W2135300639","https://openalex.org/W2144183307","https://openalex.org/W2157689518","https://openalex.org/W2158683916","https://openalex.org/W2161644106","https://openalex.org/W2166602595","https://openalex.org/W2186857320","https://openalex.org/W4239810651","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2545277503","https://openalex.org/W2129384262","https://openalex.org/W1548793402","https://openalex.org/W2003964205","https://openalex.org/W2147574710","https://openalex.org/W2587062340","https://openalex.org/W2127807338","https://openalex.org/W2563233917","https://openalex.org/W1845088154","https://openalex.org/W2106097339"],"abstract_inverted_index":{"The":[0,78],"challenge":[1],"of":[2,26,81,108,114],"pervasive":[3,194],"computing":[4,10],"consists":[5],"in":[6,162,180,193],"offering":[7],"access":[8,27,93,142,192],"to":[9,32,43,55,68,85,89,92],"services":[11],"anywhere":[12],"and":[13,29,91,125,159,175],"anytime":[14],"with":[15],"any":[16],"devices.":[17],"However,":[18],"before":[19],"it":[20],"becomes":[21],"a":[22,70,147],"reality,":[23],"the":[24,48,51,116,120,126,131,136,152,155,163,169],"problems":[25],"control":[28],"authentication":[30],"have":[31],"be":[33,56],"solved,":[34],"among":[35],"others.":[36,60],"Existing":[37],"solutions":[38],"are":[39,98,178],"inadequate":[40],"without":[41],"adaptation":[42],"this":[44,63,66,82,181],"specific":[45],"environment.":[46],"Among":[47],"promising":[49],"approaches,":[50],"trust":[52],"paradigm":[53,67],"seems":[54],"more":[57],"flexible":[58],"than":[59],"We":[61],"base":[62],"proposal":[64],"on":[65],"implement":[69],"distrust":[71,173],"model,":[72],"so\u2010called":[73],"APC":[74],"(Access":[75],"Pass":[76],"Certificate).":[77],"main":[79],"objective":[80],"model":[83,145,174],"is":[84,166],"enable":[86],"authorized":[87],"user":[88,103,121,137],"roam":[90],"trusted":[94,127,164,170],"sites":[95,165],"though":[96],"they":[97],"not":[99],"known":[100],"locally.":[101],"A":[102],"can":[104,138],"claim":[105],"two":[106,112],"kinds":[107,113],"APCs":[109],"provided":[110],"by":[111,168],"sites:":[115],"home":[117,157],"site":[118,128],"(where":[119],"has":[122],"an":[123],"account)":[124],"(that":[129],"trusts":[130],"user).":[132],"Using":[133],"these":[134],"certificates,":[135],"progressively":[139],"extend":[140],"her":[141,160],"scope.":[143],"This":[144,172],"implements":[146],"decentralized":[148],"mapping":[149],"policy,":[150],"where":[151,183],"correspondence":[153],"between":[154],"user\u2019s":[156],"profile":[158],"rights":[161],"determined":[167],"site.":[171],"its":[176,186],"implementation":[177],"presented":[179],"article":[182],"we":[184],"exhibit":[185],"importance":[187],"for":[188],"large":[189],"but":[190],"controlled":[191],"environments.":[195]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
