A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrated Support for Location Aware Security Services in Enterprise Wireless Networks
[chapter]
2005
Lecture Notes in Computer Science
For such purposes we need a security mechanism that controls the authentication and other security services based on location, in addition to basic identity information. ...
In this paper, we present an architecture of location aware security services for enterprise wireless networks. ...
We are thankful to the anonymous reviewers for their useful feedback. ...
doi:10.1007/11596042_104
fatcat:eqaemjlsdvddzcbovlpmh64x54
Privacy, Trust and Identity in Pervasive Computing: A Review of Technical Challenges and Future Research Directions
2012
International Journal of Distributed and Parallel systems
We then present a number of security related considerations and use them as a basis for comparison between pervasive and traditional computing. ...
We will present a number of directions and topics for possible future research with respect to each of the three issues. ...
Establishing user identity requires a measure of trust (accuracy) in the process of verification as an indication of the system confidence in the user established identity. ...
doi:10.5121/ijdps.2012.3318
fatcat:py55skwoyrev3a2q4k7df4oblq
A trust-based security mechanism for nomadic users in pervasive systems
[article]
2012
arXiv
pre-print
In a highly distributed and pervasive system, a uniform and centralized security management is not an option. ...
inadequate, especially problems of identification and authentication. ...
A trust-based security mechanism for nomadic users In order to fully exploit the concept of spreading the trust to interconnect security systems of various domains, we propose a generic architecture in ...
arXiv:1212.4373v1
fatcat:c3a3pm5oerfgvaytezx6xj6q5i
FlexRFID: A Security and Service Control Policy-Based Middleware for Context-Aware Pervasive Computing
2014
International Journal of Advanced Research in Artificial Intelligence (IJARAI)
In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object. ...
In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications' business rules in real time through its policy-based ...
BRL Architecture In general a policy management system is composed of three main entities; the PDP (Policy Decision Point), the PEP (Policy Enforcement Point), and the PIB (Policy Information Base). ...
doi:10.14569/ijarai.2014.031004
fatcat:d4z7rv7hezht5hm2gkznuwsbr4
Dissecting the Security and Protection Issues in Pervasive Computing
2018
Mehran University Research Journal of Engineering and Technology
The paper reviews many existing systems that offer possible security to pervasive users. ...
On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. ...
[16] in their paper "Preserving Privacy in environments with location-based applications" describes LocServ applications use a number of systems where users can identify location query by using any ...
doi:10.22581/muet1982.1802.02
fatcat:cua5uvixt5eopnu5vvjbojhnjq
Privacy Issues In Pervasive Healthcare Monitoring System: A Review
2010
Zenodo
We narrow down the issues and chose to focus on the issue of 'lack of support in designing privacysensitive applications' by proposing a privacy-sensitive architecture specifically designed for pervasive ...
Pervasive healthcare systems are applications that can support patient-s need anytime and anywhere. ...
Based on these issues, in the remainder of this paper we address privacy framework and propose a methodology for producing a privacy architecture that can be used by system developers to include a better ...
doi:10.5281/zenodo.1331482
fatcat:vr5yjkybhngmzfutipy7uimayi
Location-Aware Computing, Virtual Networks
2009
IEEE pervasive computing
The Whereabouts system is the base infrastructure that provides for high-speed policy invocation and a secure publish-subscribe mechanism for data sharing given a set of user-specified policies (see K. ...
Location-based services include the time and location contexts of a request. ...
If accepted, they are edited by the magazine's staff for grammar and style conventions. Submit a WiPs report on your project to pvcwips@computer.org.
IN THE MIDDLE OF A PERVASIVE COMPUTING PROJECT? ...
doi:10.1109/mprv.2009.78
fatcat:v74mwfzsbzf4bk7e3uxtlpjana
Autonomic pervasive applications driven by abstract specifications
2012
Proceedings of the 2012 international workshop on Self-aware internet of things - Self-IoT '12
Existing development approaches do not provide explicit support for managing dynamism. In this paper we describe Rondo, a tool suite for designing pervasive applications. ...
Pervasive application architectures present stringent requirements that make their development especially hard. ...
Rondo provides a domainspecific language based on the notion of components to define the architecture of pervasive applications. ...
doi:10.1145/2378023.2378028
fatcat:j7p7so2d7vh3xdqbrcru3ixucy
A User Profile Based Access Control Model and Architecture
2013
International Journal of Computer Networks & Communications
In this paper, we propose a novel adaptable access control model and its related architecture in which the security policy is based on the handicap situation analyzed from the monitoring of userss behavior ...
in order to grant a service using any assistive device within intelligent environment. the design of our model is an ontology-learning and evolving security policy for predicting the future actions of ...
Service provision is handled by the development of context aware based access control models for pervasive systems. ...
doi:10.5121/ijcnc.2013.5112
fatcat:dci2p3a4jbddxdpas4e2n4c4vq
Combining Theory and Systems Building in Pervasive Computing
2010
Computer journal
Leveraging a hierarchical policy model and a policy language, the proposed method triggers services based on the situation and/or location of users and events. ...
They proposed a rule-based system that separate changing factors from the actual systems and concluded a better system adaptability through real-life experiments. 2 Pervasive computing technologies have ...
doi:10.1093/comjnl/bxp099
fatcat:nkmlwmfh2zcyrd37gmou2lcntq
Pervasive Healthcare: Applications, Challenges And Wireless Solutions
2005
Communications of the Association for Information Systems
An integrated wireless architecture that is designed to use the capabilities of current and emerging wireless and mobile networks for location management, intelligent emergency system, patient monitoring ...
Pervasive healthcare is considered a solution to many existing problems and a possible future of the current healthcare services. ...
GPS AND A-GPS Satellite-based systems such as GPS (Global Positioning Satellite-system) can be used for location tracking. ...
doi:10.17705/1cais.01603
fatcat:y7d3rxczgngc7hy5o4ptqnnkpe
Towards Security and Privacy for Pervasive Computing
[chapter]
2003
Lecture Notes in Computer Science
While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information ...
Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. ...
Case Study: Gaia OS Security Gaia [13] [14] [15] is a component-based, middleware operating system that provides a generic infrastructure for constructing pervasive computing environments. ...
doi:10.1007/3-540-36532-x_1
fatcat:pbjvog2gnrdvticsrqchzwuyt4
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
[chapter]
2004
Lecture Notes in Computer Science
The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment. ...
Our solution presented requires an infrastructure of pervasive and context sensing technology, to provide entity mapping, policy and trust management services. ...
We also include a policy called an introspective policy, which is a form of obligation policy that states conditions and controls for an entity's internal reconfiguration based on the context. ...
doi:10.1007/978-3-540-39881-3_15
fatcat:aken3po755ee3bukkcfzedfreq
Trust Information-Based Privacy Architecture for Ubiquitous Health
2013
JMIR mHealth and uHealth
Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS). ...
Results: The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based ...
Acknowledgments The results presented in this paper are based on the findings of the Trusted eHealth and eWelfare Space (THEWS) project. ...
doi:10.2196/mhealth.2731
pmid:25099213
pmcid:PMC4114421
fatcat:4idxpcnb6raffasiljjrxtfpga
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
2009
2009 International Conference on Network-Based Information Systems
Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications. ...
This is due to the high levels of personal and private data sharing in these systems. ...
ACKNOWLEDGEMENTS This work was partially supported by a UAE University research grant #01-04-9-11/08. ...
doi:10.1109/nbis.2009.31
dblp:conf/nbis/Al-JaroodiAAM09
fatcat:5mpt4b24cjhynhop3dveyrw6ve
« Previous
Showing results 1 — 15 out of 16,902 results