860 Hits in 7.4 sec

A Smart Card Solution for Access Control and Trust Management for Nomadic Users [chapter]

Daniel Díaz Sánchez, Andrés Marín Lopez, Florina Almenárez Mendoza
2006 Lecture Notes in Computer Science  
Advanced trust management and access control are not addressed.  ...  Increasing efforts are placed on security solutions for nomadic users. Solutions based on smart cards offer physical and logical portability, robustness, low cost, and high security.  ...  Similar efforts and solutions are needed for trust management, security cornerstone. Nomadic users need solutions offering trust management based on smart cards.  ... 
doi:10.1007/11733447_5 fatcat:4hm3tb4k4jax7bqfz3hse6m75e

A Three-dimensional Framework for Security Implementation in Mobile Environments [chapter]

Bethuel Roberto Vinaja
2001 Advances in Information Security Management & Small Systems Security  
This paper describes a framework that can be used to identify security requirements for a specific mobile environment.  ...  Specific security measures for mobile hardware, mobile users and mobile software are also discussed. Security, Mobility, Mobile Agents, Mobile Computers, Wireless  ...  A solution can be the use of other authentication methods based on smart cards or token authentication. However, the smart card can be lost too.  ... 
doi:10.1007/0-306-47007-1_3 fatcat:j6fbt3rvzjb3lfqyxc5jcuxsgi

Smart cards

Raphaël Marvie, Marie-Claude Pellegrini, Olivier Potonniée
2000 Proceedings of the 9th workshop on ACM SIGOPS European workshop beyond the PC: new challenges for the operating system - EW 9  
This article deals with a common means to access a same service from various kinds of devices, and explains how smart cards, as mediums compatible with most types of terminals, can be used as application  ...  With the proliferation of computers which do not resemble computers, such as mobile phones, TV's, PDA's, end-users wish to take advantage of them to access their applications and information, wherever  ...  Towards a means to support mobility and to manage heterogeneity Users' mobility Users being more and more nomadic due to work or leisure, solutions have to be found to provide them with their applications  ... 
doi:10.1145/566726.566770 dblp:conf/sigopsE/MarviePP00 fatcat:45fqoicczjg4totsmngixc5j2q

Device Authentication In Wireless And Pervasive Environments

Georgios Kambourakis, Stefanos Gritzalis, Jong Hyuk Park
2010 Intelligent Automation and Soft Computing  
Inter-domain device authentication, where applicable, and users' privacy as a side-effect are investigated as well.  ...  A qualitative comparative analysis for the device authentication schemes in question is also offered, probing its applicability for both infrastructure and ad-hoc deployments.  ...  Smart Cards In NIST report 7206 [17] the authors employ smart cards to support user and mobile devices authentication.  ... 
doi:10.1080/10798587.2010.10643089 fatcat:3scffeggbbad3f2kqwn6z7qlti

Nomadic mobility between smart homes

Raihan Ul Islam, Mischa Schmidt, Hans-Joerg Kolbe, Karl Andersson
2012 2012 IEEE Globecom Workshops  
Powerful, user-friendly mobile devices and costefficient wireless access technologies have lately changed the landscape for smart home environments to a large extent.  ...  This paper presents and evaluates an architecture for nomadic mobility in such environments where end-users, by authenticating their terminals with a node in the home or visited environment using the infrastructure  ...  ACKNOWLEDGMENT This work has partially been supported by the Nordic Interaction and Mobility Research Platform (NIMO) project [21] funded by the InterReg IVA North program.  ... 
doi:10.1109/glocomw.2012.6477725 dblp:conf/globecom/IslamSKA12 fatcat:wiblixt5sjakffozlw7fclkmga

Mobile databases

Guy Bernard, Pascal Molli, Philippe Pucheral, Claudia Roncancio, Patricia Serrano-Alvarado, Patrick Valduriez, Jalel Ben-othman, Luc Bouganim, Gérôme Canals, Sophie Chabridon, Bruno Defude, Jean Ferrié (+2 others)
2004 SIGMOD record  
This paper reports on the main results of a specific action on mobile databases conducted by CNRS in France from  ...  Middleware adaptability Nowadays, users become more and more nomadic.  ...  We are working on a solution called C-SDA (Chip-Secured Data Access), which allows querying encrypted data while controlling personal privileges [BoP02] .  ... 
doi:10.1145/1024694.1024708 fatcat:hlc4utswi5f6dkbgdbo4mumk3q

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments [chapter]

Philip Robinson, Michael Beigl
2004 Lecture Notes in Computer Science  
Our solution presented requires an infrastructure of pervasive and context sensing technology, to provide entity mapping, policy and trust management services.  ...  It is then the means by which we seek to limit access to items or knowledge that have some value to us. The extremities of these limitations range from oneself to a group of trusted peers.  ...  Security through Physical Artefacts Smart Cards represent a well-secured and limited interface device for transporting a person's virtual identification [8] .  ... 
doi:10.1007/978-3-540-39881-3_15 fatcat:aken3po755ee3bukkcfzedfreq

What's in your wallet?

Scott D. Mainwaring, Ken Anderson, Michele F. Chang
2005 CHI '05 extended abstracts on Human factors in computing systems - CHI '05  
Individuals arrived at similar (if imperfect) solutions to common problems of temptation management and access control, identity management and partitioning, and collecting tokens of affiliation and history  ...  As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents, through photographs,  ...  ACKNOWLEDGMENTS We thank our research participants, and our collaborators at USC and Keio University Shonan Fujisawa Campus: Dr. Mizuko Ito and Dr.  ... 
doi:10.1145/1056808.1056979 dblp:conf/chi/MainwaringAC05 fatcat:marzpv6ux5fvpf5l2dfso4ynsi

Pervasive authentication and authorization infrastructures for mobile users

Jordi Forné, Francisca Hinarejos, Andrés Marín, Florina Almenárez, Javier Lopez, Jose A. Montenegro, Marc Lacoste, Daniel Díaz
2010 Computers & security  
of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with  ...  Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI).  ...  (iii) Finally, the Signature Manager can act in two ways: a. For message signing, using the user's private key that can be placed in tamper-proof storage like a smart card. b.  ... 
doi:10.1016/j.cose.2009.09.001 fatcat:bxqvrnly55dirgkhxzmzd47yve

Mobile identity management system in heterogeneous wireless networks

Łukasz Kucharzewski, Zbigniew Kotulski
2011 Annales UMCS Informatica  
Such a solution in heterogeneous wireless networks is a fast, secure and transparent to transmission medium. Designing secure and efficient authentication protocols to enable *  ...  Creating a secure, independent of network architecture solutions effectively raising the level of security of transmitted data between end users is the main priority of our research.  ...  Implementation of encryption algorithms based on the elliptic curves is well suited for the use in mobile solutions (smart cards, mobile terminals) where the issue of energy management and the speed of  ... 
doi:10.2478/v10065-011-0016-5 fatcat:z2b2ojciuvg4tn5ozi5xsmwcyq

Trust and Authorization in Pervasive B2E Scenarios [chapter]

Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
2003 Lecture Notes in Computer Science  
This paper focuses on solutions for business-to-employee scenarios, a particular sub-domain of the ubiquitous computing paradigm in which valuable a priori trust information is available.  ...  Mechanisms and protocols are introduced to assess the trustworthiness of devices federated around a mobile user, and to allow for the delegation of authorizations between such devices.  ...  The major issues to be solved are the following: -Each mobile employee needs a certain root of trust, e.g. a user-specific identity and security module such as a smart card with some added functionality  ... 
doi:10.1007/10958513_23 fatcat:7ithdwu335axhglr5fwlvkgklm

Opportunistic data services in least developed countries

Nicolas Anciaux, Luc Bouganim, Thierry Delot, Sergio Ilarri, Leila Kloul, Nathalie Mitton, Philippe Pucheral
2014 SIGMOD record  
managing the data and enforcing access control rules, and (3) a biometric sensor to authenticate users (e.g., a fingerprint reader, well adapted to illiterate people).  ...  and from smart tokens to Internet access points.  ...  discussions and feedback on the requirements of IT solutions for LDCs.  ... 
doi:10.1145/2627692.2627704 fatcat:alujjdpjvraqpjphaw7htz6smu

Restoring the Patient Control over Her Medical History

Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Kévin Jacquemin, Philippe Pucheral, Shaoyi Yin
2008 2008 21st IEEE International Symposium on Computer-Based Medical Systems  
The objectives pursued are (1) to re-establish a natural and powerful way of protecting and sharing highly sensitive information among trusted parties and (2) to build a shared medical-social folder providing  ...  the server domain and no disconnected access to the folder.  ...  Vandewalle (Gemalto), Georges Gardarin and Karine Zeitouni (University of Versailles) for their active participation in this project.  ... 
doi:10.1109/cbms.2008.101 dblp:conf/cbms/AnciauxBBJPY08 fatcat:ujnktcchfbdnjhvvllbdiscqfi

Opportunities for electronic commerce in networking

D. Messerschmitt, J.-P. Hubaux
1999 IEEE Communications Magazine  
and payment Customer care Backbone infrastructure operators • Integration of service mechanisms on a single smart card Satellite infrastructure operators • Selection and recommendation of user functionality  ...  A nomadic user may deal with many providers, making a bundle less attractive, and EC can mitigate the resulting inconvenience.  ... 
doi:10.1109/35.790966 fatcat:aalqugergbdoxij5mqynvuuuji

User Acceptance of Pervasive Information Systems: Evaluating an RFID Ticketing System

Dimitrios C. Karaiskos, Panos E. Kourouthanassis, George M. Giaglis
2007 European Conference on Information Systems  
communicate user related and environmental information, and supporting user tasks and activities unobtrusively.  ...  The results from a multiple regression analysis suggest that the salient beliefs of the technology acceptance model, namely perceived usefulness and ease of use are still strong predictors of user behaviour  ...  (European Social Fund, 75%), by public expenditure from Greek public sector (Ministry of Development, General Secretariat for Research and Technology, 25%) and from private sector.  ... 
dblp:conf/ecis/KaraiskosKG07 fatcat:rb6ue7od7jfbpal24722mnampe
« Previous Showing results 1 — 15 out of 860 results