The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In modern society, as the rapid development of IT technology combined with computer-based high-speed communication networks is enabling provision of a wide spectrum of services and devices, we have been confronted with a new era of cultural transformation, referred to as the information society. However, the security requirements that need to be considered have become more complicated and diversified,...
Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data...
The omnipresence of devices around the user must provide to him useful and relevant services according to its needs. However, each user wants to control how interact with his environment, in particular which services or data he is ready to share with this environment. Consequently, it is necessary to ensure a transparent access to the resources form any point of the pervasive space, to any probably...
As demands for treating an access control on the client side, which is conventionally controlled by a server, increase, there is a need to treat query processing effectively and securely in an environment with limited resources. Access control that has been previously performed only focused on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
To conquer the problems existing in access control mechanisms available nowadays, such as how to manage the access authorities of the users and the protected resources, and how to keep the confidential data from visiting and modifying illegally, a new access control mechanism called multi-device TBPM-RBAC (MD-TBPM-RBAC) is proposed in this paper. According to the demand for unified users management...
Contextual information plays an important role in hiding technological complexities from a user's point of view in ubiquitous and pervasive environments. In terms of access control, contextual information can be used to minimize the set up and access control complexities and at the same time to allow users to gain access to resources pervasively without difficulties. RBAC has been used and adopted...
This paper introduces a new paradigm for strong authentication within the WEB2 landscape. We detail SSL smart cards working with dual SSL stacks. We describe the structure of a cheap client's platform, and we analyze its real time performances. We also take into account the impact of these infrastructures for WEB server's setup. Finally, we suggest solving scalability issues for credentials distribution,...
In the ubiquitous environment, when a user obtains services from a domain and goes between domains, there is a need to move freely and have services provided continuously. Also, the service provider wants to authenticate a user easily. But a serious problem exists: How can a user's personal information be protected and how can a user control their information? In this paper, we propose a system to...
Sensitive information is increasingly becoming more accessible. Access control is a mechanism that is widely used to protect such information. Extensible Access Control Markup Language (XACML) is one of the most prominent access control policy languages. The XACML core specification defines an entity called the policy decision point (PDP) for evaluating policies to make a decision on incoming access...
As a number of home network services are available and smart environment is expanding into ubiquitous computing environment, we need to protect smart environment system from illegal accesses and a variety of threats. Smart environment is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since it is connected to Internet...
With the advent of various access technologies and increasing number of applications, a set of challenges concerning efficient delivery of ubiquitous services to heterogeneous users and devices have been posed. One of the important challenges is to integrate quality of service (QoS), security and mobility support in heterogeneous networks. To facilitate the interworking of these mechanisms we propose...
In a nutshell, UPnP aims to enable simple and robust connectivity among consumer electronics, intelligent appliances and mobile devices from many different vendors. Nowadays, it is getting an increasing popularity due to its robust way of connecting devices and the massive number of already developed applications, complementing the useful new era of pervasive computing. Although UPnP is an easy-to-use...
Recently, home intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology. This paper designs a ubiquitous computing based smart home safety management (U-SHM) for digital life. The proposed scheme integrates RFID and context awareness technologies in ubiquitous environments to increase the efficiency of mobile commerce and improve the life...
As NETWORK attackers become more and more sophisticated and wireless communications make the potential risks in data protection more serious, we come to need much stronger authentication and access control systems. In this paper, we propose a combined authentication method including biometric and access control system based on attribute-wise encryption in wireless environment for ubiquitous computing...
Firewalls are among the most pervasive network security mechanisms, deployed extensively from the borders of networks to end systems. The complexity of modern firewall policies has raised the computational requirements for firewall implementations, potentially limiting the throughput of networks. Administrators currently rely on ad hoc solutions to firewall optimization. To address this problem, a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.