The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents security management framework which implements mutual authentication services, confidentiality, intrusion detection and access control in mobile environments. The goal is to ensure the confidentiality, availability of services and user privacy through Privacy-Enhancing Technologies. The idea is based on security authorities and interceptors agents that distribute security tickets...
With the advancement of internet and smart devices from decades, Societies appear ready to adopt new technologies as fast as they emerge. In today world, advances are making thoughts into reality. Every day we read about new advancements, one emerging area with such advancement is that of UBIQUITOUS COMPUTING (UbiCom). UbiCom is a latest concept of computing where we can see the use of computing anywhere...
With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, trust and privacy concerns continuously surface as a key deterrent to the adoption of these emergent technologies. The ensuing literature presents a Secure,...
The emergence of location-aware mobile social networking applications (SNAs) has gained considerable prominence in ubiquitous computing. However, the weak designs of privacy protection result in more potential risks that users have to face. This paper presents a deep insight into the designs of privacy protection, especially from the perspective of location privacy. Three main potential risks and...
The following topics are dealt with: mobile computing; wireless communications; database and data mining; grid and cloud computing; ubiquitous computing; intelligent and bio-inspired computing; advanced networking; security; distributed and parallel computing; data management; workflow management; quality of services and scientific computing.
In ubiquitous environments, resources limitations and fluctuations combined with device mobility requires the dynamic adaptation of mobile applications. This paper reports on an extension of the MUSIC adaptation middleware to support aspect-oriented programming in order to handle cross-cutting adaptations. Basically, this extension specifies an architectural model for defining applications as a composition...
The following topics are dealt with: human-computer interaction; user-centered design; social computing; social intelligence; ubiquitous computing; mobile system; gaming; computer-assisted learning; cognition; privacy; security; trust management; human-centered evaluation; information visualization; visual analytics; and semantic systems.
Residential Network is an inter-connection of several electrical and electronic home appliances for convenient, comfortable and daily life of home users. It is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home with various home network services regardless of device, time and place. More and more devices will be wireless and most of them...
Researchers from Nokia propose a Web-based framework that applies a resource-based HTTP style called Representational State Transfer (REST) to enable smart spaces to support pervasive applications in various devices. Mobile devices are evolving into hubs of content and context information. Therefore, our work focuses on pervasive applications in smart spaces that use locally available connectivity...
The following topics are dealt with: embedded systems; hardware/software co-design; image processing; video processing; reliability engineering; fault tolerance; control systems; robotics; artificial intelligence; evolutionary computing; signal processing; computer architecture; computer aided design; computer networks; security; Web engineering; mobile computing; and ubiquitous computing.
In the environment of wireless and pervasive computing, wireless storage can provide flexible data access function, data transfer, data collection, and information services, etc. The paper proposes the architecture of wireless storage system, discusses wireless storage system key technologies, and gives performance analysis of it. Later, the paper illustrates related question and some algorithms,...
Secure Device Association (also known as security initialization, first-connect or simply pairing in the literature) can be referred as the process of establishing a secure channel between a pair of devices in close proximity. There have been many recent proposals to provide secure pairing of devices in close proximity. All vary in their security against different attacks, the needed hardware capabilities...
The issue of digital identity is at the heart of many contemporary strategic innovations, covering crime, internal and external security, business models etc. The area of MANets (Mobile Ad-hoc Networks) is still in its infancy in the research community, but it plays a vital role surrounded by the growing trend of mobile technology for business, private and governmental uses. The emergent notion of...
Ubiquitous connectivity and availability of P2P resources creates opportunities for building new services. This paper describes Jigsaw Distributed File System (JigDFS) which can be used to securely store and retrieve files on a P2P network anonymously. JigDFS is designed to provide strong encryption and a certain level of plausible deniability. Files in JigDFS are sliced into small segments using...
Mobile ad hoc network (MANET) is an autonomous distributed network which is constructed only with gathered nodes on the spot. In MANET, wide area communication on wireless networks can be realized because a node relays other node's packets by adopting a multi-hop routing protocol. Security is an indispensable issue in MANET because an unknown node may join the network easily. However, the demand for...
Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security...
This work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a reflection on different mobile middlewares is made: their capacities to face the challenges of mobility and security issues. The analyses show that the existing middlewares have very few approaches on security problems; security is still a complex issue to be managed in all...
In ambient environments both quantity and quality of context-aware, personalizable information will continuously increase. Acceptance and benefit will depend on personalization technologies which enable end-users to protect their privacy. However, starting from the experience how users, service providers and network operators nowadays take advantage of personalised services the authors deplore inadequate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.