Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The omnipresence of devices around the user must provide to him useful and relevant services according to its needs. However, each user wants to control how interact with his environment, in particular which services or data he is ready to share with this environment. Consequently, it is necessary to ensure a transparent access to the resources form any point of the pervasive space, to any probably...
Risk assessment plays a significant role in Decision Support Systems (DSS). Recently, there have been efforts to exploit the potential of linking risk assessment to security provisioning to provide risk-aware security services. One of these efforts is the Context-Risk-Aware Access Control (CRAAC) model that links requesters' access privileges to the risk level in the underlying access environment...
This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A virtual management plane, separate from execution resources, is defined for full run-time control by applications of their execution environment. This plane also performs non-invasive and yet effective authorization thanks to optimized access request checking. The VSK...
This paper describes the design and implementation of a pervasive computing framework, named Physicalnet. Essentially, Physicalnet is a generic paradigm for managing and programming world-wide distributed heterogeneous sensor and actuator resources in a multi-user and multi-network environment. Using a four-tier light-weight service oriented architecture, Physicalnet enables global uniform access...
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness...
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related technologies ranging to appropriate and effective action processing. The sensor field independent information access is most important issues in everywhere under the ubiquitous computing environment. We already proposed...
Embedded system serves as one of crucial components needed for various applications and services in pervasive computing environment. Security problems related to embedded systems directly influence credibility of these applications and services. In order to effectively eliminate weaknesses in current embedded systems and strongly enhance safety practices of these systems, this paper proposes a Trustzone-based...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.