Intl Workshop on Trust in Mobile Environments

Yesterday was the first International Workshop on Trust in Mobile Environments (TIME 2008), co-located with the IFIPTM 08 conference in Trondheim, Norway. The workshop merged with the Workshop on Sustaining Privacy in Autonomous Collaborative Environments (SPACE), and consisted of three sessions. Here is a brief summary on what we saw:

Keynote: Will Winsborough, University of Texas at San Antonio

Session 1: Privacy

There were two papers presented in the morning session: “Secure and Privacy-Preserving DRM For Mobile Devices with Web Service Security: An Experience Report” (Kleiner, Grittner, Kadenbach) and “Comprehensive Analysis of Web Privacy and Anonymous Web Browsers: Are Next Generation Services Based on Collaborative Filtering?” (Gulyas, Schulcz, Imre)

The whole issue of privacy seems to revolve around conflicting interests: in DRM the content producers want to keep the rights to their work (in order to provide fair distribution), while mobile users may not want to be profiled according to their access to certification authorities. In web environments, users, advertisers,  and e-commerce sites will want to dig into (or hide) the goldmine of user profiles for different reasons. The proposed solutions seemed to revolve around anonymity: but to what extent is privacy about hiding, and to what extent is it about information flow control?

Session 2: Models

The second session dealt with different views of trust models, and there were three papers: my work, “Learning to Trust on the Move,” “A Behavioural Model for Client Reputation” (Basu, Wakeman, Chalmers, Robinson), and “Towards User Driven Trust Modeling and Management” (Z. Yan, Niemi)

Perhaps the most interesting point of this session is the lack of consensus across different domains about what a trust model entails. While my work argued that mobile-trust models can be casted into a learning problem (and thus quantity and quality of information available become the key influential factors), Z. Yan’s work called for building trust-models with strong support from user-groups. Anirban Basu’s ongoing PhD work, on the other hand, described a distributed reputation-based system that can tackle problems like unsolicited e-mail.

Session 3: Mobility

The last session shifted focus from trust to mobility. There were two presentations: “Rethinking Network Mobility in Pervasive Markets: Model and Trust” (Lu Yan), and “Validation of OLSR Routing Table Based on Trust Reasoning” (Adnane, Bidan, de Sousa).

I think Lu Yan gave the most interesting presentation of the whole workshop. His work focuses on how to model human motion using a bottom-up approach. Rather than defining characteristics of mobility, he starts from observations of how people move in the Camden market, draws a number of similarities between those trajectories and the way foraging animals move, and can then build mobility models based on this. Asmaa Adnane’s work was a follow up to work that appeared in this blog previously: she discussed new attacks that her previous work could not detect, and a novel means of coping with them.

Overall, there were a lot of interesting topics discussed and issues raised. To all participants: feel free to join us and contribute your thoughts to this blog.

3 Responses to “Intl Workshop on Trust in Mobile Environments”

  1. The keynote title was Obligations that require and affect authorizations, by the
    way. Many of us have heard of Winsborough in connection to his credential-based
    trust work and sensitive credential exchange; in his keynote, he discussed more
    recent policy work on managing interdependencies between obligations and
    authorizations. Will presented a paper related to the topic on the main
    conference side as well.

  2. [...] organized in the US, and in Japan after that. We’ve summarized IFIPTM workshops on Monday and Tuesday in earlier posts, and now give a quick run-through of what this year’s conference program [...]

  3. Neal Lathia says:

    The full TIME and SPACE proceedings are now available online: http://ceur-ws.org/Vol-362