The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio frequency identification (RFID) technology is increasingly being incorporated into everyday objects. This case study examines three examples - credit cards, transit cards, and the U.S. e-Passport - given ubiquitous computing power through the addition of RFID. We explored user comprehension of RFID technology generally and these implementations specifically to understand if and how the addition...
Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. IoT imposes peculiar constraints in terms of connectivity, computational power and energy budget, which make it significantly different from those contemplated by the canonical doctrine of security in distributed systems. In order to circumvent the problem of security in IoT...
The following topics are dealt with: security; pervasive & ubiquitous computing; IPTV, video and mobility; network topology; wireless & 4G; WiMax; resilience & network planning; wireless protocols; network architectures and systems; virtualisation & scaling; self-adaptive network systems; distributed control algorithms; adaptive network control and; networked healthcare...
With a prevalence of pervasive computing, especially cloud computing, the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum...
In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set of challenges that need to be addressed, (3)then we also propose a context-aware security framework for general cyber-physical systems and suggest some...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
The following topics are dealt with: mobile computing; wireless communications; database and data mining; grid and cloud computing; ubiquitous computing; intelligent and bio-inspired computing; advanced networking; security; distributed and parallel computing; data management; workflow management; quality of services and scientific computing.
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
Execution monitoring (EM) is a ubiquitous way for monitoring untrusted applications. In this paper, we concern the characterization of security policies which was seldom concerned before. We define security policy as a security predicate which is a conjunction of two different sub-predicates: sequences predicate and states predicate. This work proves that different implementations of security policies...
Intrusion detection systems are deployed on hosts in a computing infrastructure to tackle undesired events in the course of usage of the systems. One of the promising domains of applying intrusion detection is the healthcare domain. A typical healthcare scenario is characterized by high degree of mobility, frequent interruptions and above all demands access to sensitive medical records by concerned...
In his 1960 essay, Eugene Wigner raised the question of ”the unreasonable effectiveness of mathematics in natural sciences”. After several decades of security research, we are tempted to ask the opposite question: Are we not unreasonably ineffective? Why are we not more secure from all the security technologies? I sketch a conceptual landscape of security that may provide some answers, on the background...
In any systems or environments within a ubiquitous computing context that promotes the concept of users interaction or inter-organization communication, more specifically data sharing and takes users within such context as relevant contextual information, there is the potential for interactions between systems to occur that may affect the security of the overall system. We present a scenario that...
The following topics are dealt with: human-computer interaction; user-centered design; social computing; social intelligence; ubiquitous computing; mobile system; gaming; computer-assisted learning; cognition; privacy; security; trust management; human-centered evaluation; information visualization; visual analytics; and semantic systems.
The effect of advances in the fields of ubiquitous computing, wireless communications and embedded system design has seen a corresponding rapid improvement of wireless sensor technology. Sensor networks have emerged as a platform for deployment and sustenance of critical applications that require real-time sensing and data acquisition for decision-making purposes. A significant number of malicious...
The pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by even unknown parties. So run time trustworthiness calculation would be a major issue in these environments. The huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors...
In this paper a generalized trust calculation mechanism is proposed which could be used to And out the trust values of various entities involved in a pervasive environment globally. The trust values calculated between the entities are stored in a global data store. This trust value can be used as a basis for future transactions of the entity concerned. The global data store can be maintained by a...
Service composition schemes create high-level application services by combining several basic services. Service composition schemes for dynamic, open systems, such as those found in pervasive environments, must be cognizant of the possibility of failures and attacks. In open systems, it is seldom feasible to guarantee the reliability of each node prior to access; however, there may be several possible...
As trust management can address the new security challenges in pervasive computing environments, we present our pervasive trust model TM-RMRP which is composed of input factors and trust evaluation. With the model presented, anonymous entities can collaborate with trustful parties without central security managers. To reduce or even avoid inappropriate or inaccurate recommendations, we introduce the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.