16,902 Hits in 4.5 sec

Integrated Support for Location Aware Security Services in Enterprise Wireless Networks [chapter]

Zhaoyu Liu, Peeyush Sharma, Jian Raymond Li
2005 Lecture Notes in Computer Science  
For such purposes we need a security mechanism that controls the authentication and other security services based on location, in addition to basic identity information.  ...  In this paper, we present an architecture of location aware security services for enterprise wireless networks.  ...  We are thankful to the anonymous reviewers for their useful feedback.  ... 
doi:10.1007/11596042_104 fatcat:eqaemjlsdvddzcbovlpmh64x54

Privacy, Trust and Identity in Pervasive Computing: A Review of Technical Challenges and Future Research Directions

Ameera Al-Karkhi
2012 International Journal of Distributed and Parallel systems  
We then present a number of security related considerations and use them as a basis for comparison between pervasive and traditional computing.  ...  We will present a number of directions and topics for possible future research with respect to each of the three issues.  ...  Establishing user identity requires a measure of trust (accuracy) in the process of verification as an indication of the system confidence in the user established identity.  ... 
doi:10.5121/ijdps.2012.3318 fatcat:py55skwoyrev3a2q4k7df4oblq

A trust-based security mechanism for nomadic users in pervasive systems [article]

Mohammed Nadir Djedid
2012 arXiv   pre-print
In a highly distributed and pervasive system, a uniform and centralized security management is not an option.  ...  inadequate, especially problems of identification and authentication.  ...  A trust-based security mechanism for nomadic users In order to fully exploit the concept of spreading the trust to interconnect security systems of various domains, we propose a generic architecture in  ... 
arXiv:1212.4373v1 fatcat:c3a3pm5oerfgvaytezx6xj6q5i

FlexRFID: A Security and Service Control Policy-Based Middleware for Context-Aware Pervasive Computing

Mehdia Ajana, Mhammed Chraibi, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi, Abdelilah Maach
2014 International Journal of Advanced Research in Artificial Intelligence (IJARAI)  
In Radio Frequency Identification, a unique ID is assigned to a RFID tag which is associated with a real world object.  ...  In this paper we demonstrate how our middleware solution called FlexRFID handles large amount of RFID and sensor scan data, and executes applications' business rules in real time through its policy-based  ...  BRL Architecture In general a policy management system is composed of three main entities; the PDP (Policy Decision Point), the PEP (Policy Enforcement Point), and the PIB (Policy Information Base).  ... 
doi:10.14569/ijarai.2014.031004 fatcat:d4z7rv7hezht5hm2gkznuwsbr4

Dissecting the Security and Protection Issues in Pervasive Computing

Qaisar Javaid, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail
2018 Mehran University Research Journal of Engineering and Technology  
The paper reviews many existing systems that offer possible security to pervasive users.  ...  On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used.  ...  [16] in their paper "Preserving Privacy in environments with location-based applications" describes LocServ applications use a number of systems where users can identify location query by using any  ... 
doi:10.22581/muet1982.1802.02 fatcat:cua5uvixt5eopnu5vvjbojhnjq

Privacy Issues In Pervasive Healthcare Monitoring System: A Review

Rusyaizila Ramli, Nasriah Zakaria, Putra Sumari
2010 Zenodo  
We narrow down the issues and chose to focus on the issue of 'lack of support in designing privacysensitive applications' by proposing a privacy-sensitive architecture specifically designed for pervasive  ...  Pervasive healthcare systems are applications that can support patient-s need anytime and anywhere.  ...  Based on these issues, in the remainder of this paper we address privacy framework and propose a methodology for producing a privacy architecture that can be used by system developers to include a better  ... 
doi:10.5281/zenodo.1331482 fatcat:vr5yjkybhngmzfutipy7uimayi

Location-Aware Computing, Virtual Networks

Mark S. Ackerman, Tao Dong, Scott Gifford, Jungwoo Kim, Mark W. Newman, Atul Prakash, Sarah Qidwai, David García, Paulo Villegas, Alejandro Cadenas, Antonio Sánchez-Esguevillas, Javier Aguiar (+6 others)
2009 IEEE pervasive computing  
The Whereabouts system is the base infrastructure that provides for high-speed policy invocation and a secure publish-subscribe mechanism for data sharing given a set of user-specified policies (see K.  ...  Location-based services include the time and location contexts of a request.  ...  If accepted, they are edited by the magazine's staff for grammar and style conventions. Submit a WiPs report on your project to IN THE MIDDLE OF A PERVASIVE COMPUTING PROJECT?  ... 
doi:10.1109/mprv.2009.78 fatcat:v74mwfzsbzf4bk7e3uxtlpjana

Autonomic pervasive applications driven by abstract specifications

Ozan Günalp, Levent Gürgen, Vincent Lestideau, Philippe Lalanda
2012 Proceedings of the 2012 international workshop on Self-aware internet of things - Self-IoT '12  
Existing development approaches do not provide explicit support for managing dynamism. In this paper we describe Rondo, a tool suite for designing pervasive applications.  ...  Pervasive application architectures present stringent requirements that make their development especially hard.  ...  Rondo provides a domainspecific language based on the notion of components to define the architecture of pervasive applications.  ... 
doi:10.1145/2378023.2378028 fatcat:j7p7so2d7vh3xdqbrcru3ixucy

A User Profile Based Access Control Model and Architecture

Meriem Zerkouk, Abdallah Mhamed, Belhadri Messabih
2013 International Journal of Computer Networks & Communications  
In this paper, we propose a novel adaptable access control model and its related architecture in which the security policy is based on the handicap situation analyzed from the monitoring of userss behavior  ...  in order to grant a service using any assistive device within intelligent environment. the design of our model is an ontology-learning and evolving security policy for predicting the future actions of  ...  Service provision is handled by the development of context aware based access control models for pervasive systems.  ... 
doi:10.5121/ijcnc.2013.5112 fatcat:dci2p3a4jbddxdpas4e2n4c4vq

Combining Theory and Systems Building in Pervasive Computing

B. Hu, B. Hu, V. Callaghan, Z. Lin
2010 Computer journal  
Leveraging a hierarchical policy model and a policy language, the proposed method triggers services based on the situation and/or location of users and events.  ...  They proposed a rule-based system that separate changing factors from the actual systems and concluded a better system adaptability through real-life experiments. 2 Pervasive computing technologies have  ... 
doi:10.1093/comjnl/bxp099 fatcat:nkmlwmfh2zcyrd37gmou2lcntq

Pervasive Healthcare: Applications, Challenges And Wireless Solutions

Upkar Varshney
2005 Communications of the Association for Information Systems  
An integrated wireless architecture that is designed to use the capabilities of current and emerging wireless and mobile networks for location management, intelligent emergency system, patient monitoring  ...  Pervasive healthcare is considered a solution to many existing problems and a possible future of the current healthcare services.  ...  GPS AND A-GPS Satellite-based systems such as GPS (Global Positioning Satellite-system) can be used for location tracking.  ... 
doi:10.17705/1cais.01603 fatcat:y7d3rxczgngc7hy5o4ptqnnkpe

Towards Security and Privacy for Pervasive Computing [chapter]

Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas
2003 Lecture Notes in Computer Science  
While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information  ...  Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm.  ...  Case Study: Gaia OS Security Gaia [13] [14] [15] is a component-based, middleware operating system that provides a generic infrastructure for constructing pervasive computing environments.  ... 
doi:10.1007/3-540-36532-x_1 fatcat:pbjvog2gnrdvticsrqchzwuyt4

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments [chapter]

Philip Robinson, Michael Beigl
2004 Lecture Notes in Computer Science  
The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment.  ...  Our solution presented requires an infrastructure of pervasive and context sensing technology, to provide entity mapping, policy and trust management services.  ...  We also include a policy called an introspective policy, which is a form of obligation policy that states conditions and controls for an entity's internal reconfiguration based on the context.  ... 
doi:10.1007/978-3-540-39881-3_15 fatcat:aken3po755ee3bukkcfzedfreq

Trust Information-Based Privacy Architecture for Ubiquitous Health

Pekka Sakari Ruotsalainen, Bernd Blobel, Antto Seppälä, Pirkko Nykänen
2013 JMIR mHealth and uHealth  
Ubiquitous health is defined as a dynamic network of interconnected systems that offers health services independent of time and location to a data subject (DS).  ...  Results: The architecture mimics the way humans use trust information in decision making, and enables the DS to design system-specific privacy policies using computational trust information that is based  ...  Acknowledgments The results presented in this paper are based on the findings of the Trusted eHealth and eWelfare Space (THEWS) project.  ... 
doi:10.2196/mhealth.2731 pmid:25099213 pmcid:PMC4114421 fatcat:4idxpcnb6raffasiljjrxtfpga

A Survey of Security Middleware for Pervasive and Ubiquitous Systems

Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2009 2009 International Conference on Network-Based Information Systems  
Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications.  ...  This is due to the high levels of personal and private data sharing in these systems.  ...  ACKNOWLEDGEMENTS This work was partially supported by a UAE University research grant #01-04-9-11/08.  ... 
doi:10.1109/nbis.2009.31 dblp:conf/nbis/Al-JaroodiAAM09 fatcat:5mpt4b24cjhynhop3dveyrw6ve
« Previous Showing results 1 — 15 out of 16,902 results