Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In current computing environments, collaborative computing has been a central concern in Ubiquitous, Convergent, and Social Computing. "MobiLife?? and "MyLifeBits?? are the leading projects for representing dailylifeservices and their systems require complicate and collaborative network systems. The collaborative computing environments remain in high potential risks for users' security and...
Authentication is mostly achieved by means of the ubiquitous password. This is sub optimal in some settings, such as for user groups with cognitive or language difficulties. Many Web-based systems have user groups with widely ranging capabilities, and more innovative authentication mechanisms should be investigated to enhance usability and accessibility while still delivering the required level of...
Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security...
Nowadays, access control models take a system centric view of protecting resource, and they donpsilat take the context into account when controlling the permissions, such as RBAC. However, with the arrival of pervasive computing times, it requires thousands of applications to connect and communicate each other, which suggests not only noticing the protection of systematic resources but the context...
In the ubiquitous environment, when a user obtains services from a domain and goes between domains, there is a need to move freely and have services provided continuously. Also, the service provider wants to authenticate a user easily. But a serious problem exists: How can a user's personal information be protected and how can a user control their information? In this paper, we propose a system to...
This work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a reflection on different mobile middlewares is made: their capacities to face the challenges of mobility and security issues. The analyses show that the existing middlewares have very few approaches on security problems; security is still a complex issue to be managed in all...
Home networks and the interconnection of home appliances is a classical theme in pervasive computing research. Security is usually addressed through the use of encryption and authentication, but there is a lack of awareness of safety: preventing the computerized house from harming the inhabitants, even in a worst-case scenario where an unauthorized user gains remote control of the facilities. We address...
One of the most common types of interactions in pervasive computing has been known as impromptu collaboration, which is often characterized as being opportunistic, spontaneous, proximity-based, and transient. Many research efforts have been made to secure this type of communications, addressing issues such as secure device identification, authentication, trust, and access control. However, little...
Service access in a ubiquitous computing and pervasive Internet environment has reached a new dimension. It is not longer a question of enabling services for customers, but to design a convenient and trusted service usage. While semantic services open for a description of user preferences, profiles and social groups, privacy handling is not addressed so far. Social communities based on friend of a...
The convergence between Grid and Pervasive computing environments lead to the Pervasive Grids paradigm. This new paradigm gives birth to some new security challenges related to adhoc authentication and privacy protection. In distributed systems, and especially in pervasive grid environments, the users usually face difficulties to obtain permissions to use the resources from the sites they visit. Either...
To allow for an efficient usage of a device in pervasive computing environments when a user intends to selectively utilize multiple devices within his/her vicinity, reliable and yet convenient authentication is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the issues of establishing...
In ubiquitous computing environment, identification of objects and places in the real world is important, and 2D printing code is useful to store identifiers of them. However, since it is easy to modify the content stored in the 2D code, we must verify whether the identifier written in the 2D code is indeed issued by the authorized organization. In this paper, we propose a verification method for...
One-way authentication methods and techniques have provided the authentication service in ubiquitous environments with nomadic users almost exclusively. However, research in smart cards has allowed the implementation of solutions based on mutual remote authentication. There have been many works based on solutions that used lightweight password-based authentication, but these works have been continuously...
Our proposed simple device authentication framework aims to provide device-oriented authentication and authorization mechanisms for non-PC Internet-ready information appliances. The purpose of the framework is to prevent device spoofing, and to restrict unauthorized access to the device in a future ubiquitous network. We have developed the novel smart card software to achieve peer to peer device-oriented...
In the Internet society, IP address is treated as information of organization. This is a problem that visitor uses IP address of visited organization because IP address user of visited organization is treated as a member of the organization. For that, the user's access to home resources may be blocked by firewalls because the user's IP address is not home's one. Therefore an application of authentication...
Traditional authentication and access control are no longer suitable for ubiquitous computing paradigm. They are only effective if the system knows in advance which users are going to access and what their access rights are. Therefore, it calls for a novel security model. In this paper, we outline major security problems in ubiquitous computing and propose a new architecture, TBSI (trust-based security...
In ubiquitous computing, the main security challenges arise from network heterogeneity and from a dynamic population of nomadic users and limited devices. For these environments, security infrastructures based on traditional PKIs present a number of major drawbacks: limited scalability and reconfigurability, static vision of trust, and high administrative costs. Besides, these infrastructures are...
Mobile ad hoc networks are infrastructure-free, pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with security threats, demand solutions for securing ad hoc networks prior to their deployment in commercial and military applications. So far, the research in mobile ad hoc network has been primarily focused on routing and mobility aspects rather than...
Korea Telecommunication and Seoul National University initiated a joint project as an effort of collaboration for building U-Campus early this year. As a part, our project aims to develop a measurement infra system and measure wireless traffic in SNU NESPOT Zone. Currently, SNU NESPOT Zone is successfully built, so the registered users are able to use the Internet anywhere in Seoul National University...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.