A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Integrating Usage Control with SIP-Based Communications
2008
Journal of Computer Systems, Networks, and Communications
The Session Initiation Protocol (SIP) is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants. ...
In this paper, we introduce new architecture that implements a new type of access control called usage access control (UCON) to control the access to the SIP-based communication at preconnection, during ...
We have integrated this new concept with 8 Journal of Computer Systems, Networks, and Communications the SIP protocol to produce new architecture that helps in controlling the access to the SIP-based environment ...
doi:10.1155/2008/380468
fatcat:zte7sv3b5ndwhead44w243wzse
Vesta: A secure and autonomic system for pervasive healthcare
2009
Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare
Finegrained access control of the system is realized through authorization policies. Experimental evaluation shows that it is viable and practical for real-world pervasive healthcare. ...
This paper describes a body sensor network comprising a personal controller, various biosensors and actuators for pervasive healthcare. ...
Access control or authorization also becomes a necessity. For example, in a hospital environment, nurses or doctors often need to access resources, or even invoke operations, on a patient's system. ...
doi:10.4108/icst.pervasivehealth2009.5939
dblp:conf/ph/ZhuSLK09
fatcat:fqoyfvzvnvenvgsr6ehte32zua
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments
[chapter]
2004
Lecture Notes in Computer Science
The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment. ...
Our solution is based on the premise that computers and implicit interaction mechanisms must function in accordance with the explicit parameters of physical human-human interaction. ...
Following authentication, Covington defines Environment Roles as a methodology for capturing context in authorization and access control models [6] . ...
doi:10.1007/978-3-540-39881-3_15
fatcat:aken3po755ee3bukkcfzedfreq
Security in Smart Healthcare System: A Comprehensive Survey
2017
International Journal of Advanced Research in Computer Science and Software Engineering
This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. ...
It additionally focuses on the advancement in healthcare systems while deploying IoT services. ...
Session hijacking is the exploitation of a valid session to gain unauthorized access to the information in a computer system. ...
doi:10.23956/ijarcsse.v7i10.423
fatcat:vrystnzhjfaq3ir42k2zo5dug4
Impact assessment of policy expressiveness of an optimised access control model for smart sensors
2018
IET Information Security
In this context, this study assesses how the policy length impacts the performance of the establishment of a security association through the protocol named Hidra proposed by such an adapted access control ...
There is an innovative access control model that conveys an expressive policy language and an optimised codification for tight and flexible access control enforcement in very constrained devices. ...
In fact, the IoT concept envisions pervasive computing environments where a larger number of people and devices can discover and access services in things around them. ...
doi:10.1049/iet-ifs.2018.5204
fatcat:zsgtz443drbphoxwhyoyshdnqq
Enabling Secure Discovery in a Pervasive Environment
[chapter]
2006
Lecture Notes in Computer Science
Whereas this assumption is at the heart of many pervasive computing protocols and systems, the necessity of securing service discovery and the complexity of this task have been largely underestimated, ...
The pervasive computing paradigm assumes an essentially dynamic model of interaction between devices that also motivates the need to discover the services offered by previously unknown parties at an early ...
In pervasive computing, context-awareness would typically be enabled through the access to a set of such services. ...
doi:10.1007/11734666_3
fatcat:ecg5tw7zurgv7izwhebkjz7u7i
Services Everywhere: an Object-Oriented Distributed Platform to Support Pervasive Access to HW and SW Objects in Ambient Intelligence Environments
[chapter]
2010
Ambient Intelligence
For example when a door is opened or closed, a desktop session in a computer begins, the turning on or turning off of devices, detection of faces, etc. ...
Services Everywhere: an Object-Oriented Distributed Platform to Support Pervasive Access to HW and SW Objects in Ambient Intelligence Environments 37 . ...
How to reference In order to correctly reference this scholarly work, feel free to copy and paste the following: http://www.intechopen.com/books/ambient-intelligence/services-everywhere-an-object-oriented-distributedplatform-to-support-pervasive-access-to-hw-and-sw ...
doi:10.5772/8675
fatcat:ju3ywpifavbkzp6ka3vtaxvyni
Secure policy-based management solutions in heterogeneous embedded systems networks
2012
2012 International Conference on Telecommunications and Multimedia (TEMU)
Many schemes have been proposed for various types of devices in terms of resources, ranging from the wellstudied policy-based management in computer networks to the more challenging management in sensor ...
Index Terms-Embedded systems, policy-based management, security, XACML • SAML-integrated XACML messages transferred using the SOAP protocol (over UDP). • SOAP-encapsulated XACML messages protected with ...
, crucial for next-generation pervasive computing devices, is based on eXtensible Access control Markup Language (XACML) policies. ...
doi:10.1109/temu.2012.6294723
dblp:conf/temu/RantosPFM12
fatcat:dtoi6hssybbmbng2t4iiccqphq
Context-aware usage control for web of things
2012
Security and Communication Networks
To address these challenges, we propose a context-aware usage control model (ConUCON) , which leverages the context information to enhance data, resource, and service protection for WoT. ...
On the basis of ConUCON, we also design and implement a context-aware usage control framework on the middleware layer in our ongoing SmartHome project, to provide security and privacy protection. ...
ACKNOWLEDGEMENTS We are grateful to the guest editor and anonymous reviewers for their valuable comments, suggestions, and effort on this paper. ...
doi:10.1002/sec.424
fatcat:rniebajg6zacng3bsp3mrwsw3u
Achieving fine-grained access control in virtual organizations
2007
Concurrency and Computation
access control. ...
The proof-ofconcept prototype is designed and implemented in the Shibboleth and PERMIS infrastructures, which specifies protocols to federate authentication and authorization information and provides a ...
Thus, both components can be independently integrated. FAME controls access to the HS, PERMIS controls access to the target resource. ...
doi:10.1002/cpe.1099
fatcat:5y3somefobeutasux3ln43e66a
Towards Secure Risk-Adaptable Access Control in Cloud Computing
2018
International Journal of Advanced Computer Science and Applications
Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment. ...
The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment. ...
PDP will user the session key to encrypt p to ̅ to compute kc. Next, ( ) ̅̅̅̅̅̅̅̅̅̅̅̅ generated encapsulated value ̅ to ensure fine-grained access control. ...
doi:10.14569/ijacsa.2018.091247
fatcat:wf2roy5emvawlllehniqcdpigm
DRM & Security Enabling Mechanisms Leveraging User Centric Multimedia Convergence
[chapter]
2012
Cutting Edge Research in New Technologies
Wireless is being adopted for many new applications: to connect computers, to allow remote monitoring and data acquisition, to provide access control and security, and to provide a solution for environments ...
Hence, the need for interoperability of heterogeneous networks with hybrid structure is in doubtfully a major requirement, when integrating communication scenarios for indoor and outdoor applications. ...
Session migration architecture integrated with security and DRM aspects In a typical scenario for pervasive user-centric computing, the backbone architecture must provide to the end user the ability to ...
doi:10.5772/34380
fatcat:kqfa5hub5bfebg5uejqww6q4ry
Dynamic configuration of semantic-based service provisioning to portable devices
2006
International Symposium on Applications and the Internet (SAINT'06)
Context-awareness is starting to emerge as a key driving principle for the design and provisioning of pervasive services in pervasive computing environments. ...
needed to access semantic-based services, and that offers a wide set of mechanisms for making viable semantic-based service provisioning to resource-constrained portable devices. ...
Some initial research ideas are starting to emerge that aim to exploit semantic techniques for service provisioning in pervasive environments [1, 2, 4] . ...
doi:10.1109/saint.2006.26
dblp:conf/saint/CorradiMT06
fatcat:ff2dyvxnczgt3kqf6poxmz3hei
An architecture for pervasive healthcare system based on the IP multimedia subsystem and body sensor network
2015
Facta universitatis - series Electronics and Energetics
This paper also describes usage of the Session Initiation Protocol (SIP) protocol to communicate with the IMS core, whereas data are transmitted within the body of SIP messages. ...
The possibility of using mobile devices as gateways between sensor networks and IMS has led to the development of integrated solutions such as the one proposed in this paper. ...
Acknowledgement: This work has been partially supported by the Serbian Ministry of Education and Science under technology development project TR32023 -"Performance Optimization of Energy-efficient Computer ...
doi:10.2298/fuee1503439m
fatcat:ocl2gtn4n5h6lkyqhsybgx5svi
Information-centric pervasive healthcare platforms
2010
Proceedings of the 4th International ICST Conference on Pervasive Computing Technologies for Healthcare
Pervasive health care is gaining attention outside the research community. ...
We believe that this approach alone can address the various governance and provenance conflicts that emerge in real-life deployments. ...
Initial work is underway to integrate this work into our environment to fully utilize its potential in our design. ...
doi:10.4108/icst.pervasivehealth2010.8768
dblp:conf/ph/TrossenPGBS10
fatcat:3aecokkmxfewriimkosrnovevu
« Previous
Showing results 1 — 15 out of 6,206 results