The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The omnipresence of devices around the user must provide to him useful and relevant services according to its needs. However, each user wants to control how interact with his environment, in particular which services or data he is ready to share with this environment. Consequently, it is necessary to ensure a transparent access to the resources form any point of the pervasive space, to any probably...
Risk assessment plays a significant role in Decision Support Systems (DSS). Recently, there have been efforts to exploit the potential of linking risk assessment to security provisioning to provide risk-aware security services. One of these efforts is the Context-Risk-Aware Access Control (CRAAC) model that links requesters' access privileges to the risk level in the underlying access environment...
This paper presents VSK, a lightweight adaptable OS authorization architecture suitable for self-protection of pervasive devices. A virtual management plane, separate from execution resources, is defined for full run-time control by applications of their execution environment. This plane also performs non-invasive and yet effective authorization thanks to optimized access request checking. The VSK...
This paper describes the design and implementation of a pervasive computing framework, named Physicalnet. Essentially, Physicalnet is a generic paradigm for managing and programming world-wide distributed heterogeneous sensor and actuator resources in a multi-user and multi-network environment. Using a four-tier light-weight service oriented architecture, Physicalnet enables global uniform access...
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness...
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related technologies ranging to appropriate and effective action processing. The sensor field independent information access is most important issues in everywhere under the ubiquitous computing environment. We already proposed...
Embedded system serves as one of crucial components needed for various applications and services in pervasive computing environment. Security problems related to embedded systems directly influence credibility of these applications and services. In order to effectively eliminate weaknesses in current embedded systems and strongly enhance safety practices of these systems, this paper proposes a Trustzone-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.