The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Service exploration is an essential element in pervasive computing environments to minimize administrative overhead.It enables devices and network services to properly explore,configure, and then communicate with each other.Much research on service exploration has been conducted,but most protocols are not designed with security and privacy support.We proposed a prudent service exploration model for...
Existing context-based access control mechanisms have a problem of tradeoffs between the expressive power and the management efficiency of authorization policy. In this paper we introduce the context-aware role engineering which is a new concept for context-based access control and context-aware service scenario driven role engineering approach. The context-aware role engineering enables that context-based...
While ubiquitous healthcare applications over the Internet promise increasing efficiency, accuracy, and availability of medical treatment, security has received increasing attentions as one of the critical research challenges. In this paper, we consider security issues due to increasing access sharing of patient information resources in the networked environment. We propose a novel efficient access...
In modern society, as the rapid development of IT technology combined with computer-based high-speed communication networks is enabling provision of a wide spectrum of services and devices, we have been confronted with a new era of cultural transformation, referred to as the information society. However, the security requirements that need to be considered have become more complicated and diversified,...
Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data...
Modern business goals are often fulfilled with workflows that may cross many organisations and utilise services on a variety of devices and/or supported by different platforms. Current workflows are inherently context-aware. Each context is governed and constrained by its own policies and rules to prevent unauthorised participants from executing sensitive tasks and also to prevent tasks from accessing...
In open pervasive computing environment, various devices and applications are frequently changeable. It is hard to authenticate strange entities for lack of centralized management authority. In order to solve access control problem in open pervasive environment, a trust based access control framework is introduced in this paper, and a corresponding prototype system is designed, implemented and integrated...
Today, the service computing research is focusing on providing efficient solutions to the challenges of the future Internet applications. The major difference that is created by these applications is their ubiquitous on-the-move availability as cloud services. This means that the mobility is rapidly becoming a fundamental requirement of the future. In addition to that, the integration of mobile and...
Ubiquitous availability and need for transparent remote data access has increased significantly due to increased capacity and widespread availability of computer networks such as Internet. Remote access can be facilitated by storing data at the file server and accessing data as required using distributed file systems (DFS's). This remote access exposes file server, client and data to various on-line...
When the concept of pervasive computing is proposed, from a simple application model to the study of various algorithms, the technology of pervasive computing is developing rapidly. This paper firstly introduced the concept of pervasive computing and its security problems. Then by introducing TePA (Tri-Element Peer Authentication) security mechanisms, an access control mechanism is introduced. It...
The omnipresence of devices around the user must provide to him useful and relevant services according to its needs. However, each user wants to control how interact with his environment, in particular which services or data he is ready to share with this environment. Consequently, it is necessary to ensure a transparent access to the resources form any point of the pervasive space, to any probably...
The operational characteristics of ubiquitous computing environments (UbiCom) generate new access control requirements which existing classical access control models fail to support efficiently. However, the Usage Control (UCON) family of models introduces components and mechanisms that seem to be able to partially match the specific requirements imposed by UbiCom environments. In this paper, an evaluation...
Secure interoperation between separately administrated domains, is becoming one of the major challenges in multidomain environments. In fact, many companies extend their business beyond traditional boundaries. To perform their tasks, employees must work from everywhere, and have access to applications belonging to other business units, suppliers, partners and affiliates. This is the case of most ubiquitous...
As demands for treating an access control on the client side, which is conventionally controlled by a server, increase, there is a need to treat query processing effectively and securely in an environment with limited resources. Access control that has been previously performed only focused on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper...
The interacting entities in web service usually can't be predetermined and may be in different security domains. To address the access authorization for unknown users across domain borders, access control of web service should be performed based on the domain-independent access control information but not the identities. In this paper, a context and role based access control policy model is proposed...
The ever increasing diversity and mobility of devices have originated a marked rise in ubiquitous resources; a great number of collaborative applications could be exploited just by employing an efficient ubiquitous resource management mechanism. The CARM (Composable-Adaptive Resource Management) middleware-based architecture provides a flexible infrastructure where personal devices create seamlessly...
On the basis of the trust model, proposed a trustworthiness based fuzzy access model for control (TBFAMC). And achieved the appraisal of dynamic trust degree of subject, automatically work out the correlation with respect to the requested authority according to the composition of the trustworthiness of subject. Established interval-valued fuzzy policy rule for authority and achieve the effective control...
Risk assessment plays a significant role in Decision Support Systems (DSS). Recently, there have been efforts to exploit the potential of linking risk assessment to security provisioning to provide risk-aware security services. One of these efforts is the Context-Risk-Aware Access Control (CRAAC) model that links requesters' access privileges to the risk level in the underlying access environment...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
With the open characteristics of ubiquitous computing environment,the diversity of users is not only inevitable, but also bring threats to the security of the system. Generally, users can access resources and abtain services anytime anywhere in the ubiquitous computing environment, however, the owner of resource and requestor of resource do not know each other. Here discussed the trust-based dynamic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.