39,172 Hits in 6.8 sec

Information exposure control through data manipulation for ubiquitous computing

Boris Dragovic, Jon Crowcroft
2005 Proceedings of the 2004 workshop on New security paradigms - NSPW '04  
In this paper, we present our initial work on a novel paradigm for information security and privacy protection in the ubiquitous world.  ...  Unlike in traditional, static, execution environments, information in the Ubiquitous world is exposed, throughout its lifetime, to constantly varying security and privacy threats caused by the inherent  ...  Secondly, much of the today's ubiquitous devices' built-in functionality can be used for limited context inference.  ... 
doi:10.1145/1065907.1066036 dblp:conf/nspw/DragovicC04 fatcat:tpyqiefupvdinl6xcx6fqt2hyq

Security middleware approaches and issues for ubiquitous applications

Jameela Al-Jaroodi, Imad Jawhar, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2010 Computers and Mathematics with Applications  
Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications.  ...  Recently, ubiquitous computing and pervasive environments evolved tremendously and became an integral part of many fields and application domains.  ...  We would also like to thank the anonymous reviewers for their valuable comments and suggestions that helped us produce a more concise article.  ... 
doi:10.1016/j.camwa.2010.01.009 fatcat:ds73w7jfo5ejvpdpwlgtmq2lba

Trust Information-Based Privacy Architecture for Ubiquitous Health

Pekka Sakari Ruotsalainen, Bernd Blobel, Antto Seppälä, Pirkko Nykänen
2013 JMIR mHealth and uHealth  
The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments.  ...  Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments.  ...  Acknowledgments The results presented in this paper are based on the findings of the Trusted eHealth and eWelfare Space (THEWS) project.  ... 
doi:10.2196/mhealth.2731 pmid:25099213 pmcid:PMC4114421 fatcat:4idxpcnb6raffasiljjrxtfpga

Towards a Component based Privacy Protector Architecture

Amr Ali Eldin, René W. Wagenaar
2003 International Conference on Advanced Information Systems Engineering  
In this paper, we discuss the requirements, functionalities and roles needed to support privacy protection in context aware mobile information systems.  ...  The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency of dealing with personal  ...  In this paper, although focus has been given to supporting mobile users explicit consent rather than security; we enunciate that security functionalities to be included, in the future, in the design and  ... 
dblp:conf/caise/EldinW03 fatcat:6imfwadxfnefpevzfzs2dx6adm

Formal Model based Specification of Authorization Framework for Ubiquitous Enterprise Computing Environment

Supreet Kaur, Kawaljeet Singh
2014 International Journal of Computer Applications  
In this paper a formal authorization model for ubiquitous computing environment is proposed.  ...  With the emergence of new dynamic computing environments, the traditional identity based authorization models are unable to meet multiple attribute based policy requirements through single function based  ...  [13] in their paper presented a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents  ... 
doi:10.5120/16083-5220 fatcat:sm6s5lay5nburpzcrxqxnspsme

A Survey of Security Middleware for Pervasive and Ubiquitous Systems

Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2009 2009 International Conference on Network-Based Information Systems  
Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications.  ...  This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way.  ...  Our survey focuses on security middleware particular to pervasive and ubiquitous environments. III.  ... 
doi:10.1109/nbis.2009.31 dblp:conf/nbis/Al-JaroodiAAM09 fatcat:5mpt4b24cjhynhop3dveyrw6ve

KNOW Why your access was denied

Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
2004 Proceedings of the 11th ACM conference on Computer and communications security - CCS '04  
To achieve a balance between system usability and the protection of security policies, we present Know, a framework that uses Ordered Binary Decision Diagrams (OBDDs) and cost functions to provide feedback  ...  Relevant feedback enhances system usability, especially in systems where permissions change in unpredictable ways depending on contextual information.  ...  A Useful Cost Function We now present a useful cost function that improves on the results of the naïve cost function in the context of ubiquitous computing environments.  ... 
doi:10.1145/1030083.1030092 dblp:conf/ccs/KapadiaSC04 fatcat:aoxkyhzw6nf7pgkli36ee4q5x4

A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios [chapter]

Javier López, Antonio Maña, Antonio Muñoz
2006 Lecture Notes in Computer Science  
In this paper we present a solution to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios.  ...  Our approach is based on two main building blocks: trusted platforms and profiles.  ...  A secure execution environment for agents in ubiquitous computing scenarios The main goal of this paper is to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing  ... 
doi:10.1007/11833529_99 fatcat:ofynghfd2ff7bbnqszyh7sbonq

Context-Aware Access Control for Resources in the Ubiquitous Learning System Using Ciphertext-Policy Attribute-based Encryption

Ling Yu, Bo Chen, Bei Huang, Ning Wang
2013 Pacific Asia Conference on Information Systems  
the need of unknown user access control in ubiquitous learning environment.  ...  Ubiquitous learning system based on cloud computing brings forth new challenges for resources security when owners outsource resources for sharing on cloud servers.  ...  The scheme will be improved in our on-going and further work.  ... 
dblp:conf/pacis/YuCHW13 fatcat:xibi3yhlhfh2xjanofsvzhjp2i

Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments [chapter]

Yitao Duan, John Canny
2005 Lecture Notes in Computer Science  
In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive.  ...  Data will often be streaming at high rates (video and audio) and it must be dealt with in real-time. Protecting the privacy of users is of central importance.  ...  This work was supported in part by National Science Foundation award #EIA-0122599 (Title: "ITR/SI: Societal Scale Information Systems: Technologies, Design, and Applications").  ... 
doi:10.1007/11423409_11 fatcat:zxf2vk35lrdr5oiwr4subjvx44

Privacy Preservation Technologies in Internet of Things [article]

Jaydip Sen
2012 arXiv   pre-print
In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.  ...  In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things.  ...  In the following section, we describe the some examples that demonstrate how SMC approach may be used to ensure privacy preservation and protection in an ubiquitous computing environment. III.  ... 
arXiv:1012.2177v3 fatcat:56copu3ttjgldcndfoab7sbs6a

Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments

Benchaa Djellali, Abdallah Chouarfia, Kheira Belarbi, Pascal Lorenz
2015 Network Protocols and Algorithms  
In such context, security is still very fragile and there is often a violation of user privacy and service interference. For this, a special interest in ubiquitous network security is going up.  ...  The authentication protocol is simple and secure, protects the privacy of user and aims to satisfy the security requirements.  ...  While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored  ... 
doi:10.5296/npa.v7i1.7208 fatcat:e6e7cgyrafd6bpieam4syubimq

A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor [chapter]

Byunggil Lee, Howon Kim
2008 Home Networking  
Recently horne intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology, In this paper, we focused on user's context based intelligent security  ...  It will be a practical application of RFID and sensor network for ubiquitous horne safety environment. The proposed system has lots of advantages in user safety and energy efficiency.  ...  Each policy contains a subject role(the subject on which the policy is to apply), and object role(the object to which the policy applies) and action(on the object), an environment role(the context of the  ... 
doi:10.1007/978-0-387-77216-5_16 dblp:conf/ifip6-2/LeeK07 fatcat:bwcn3cfkazezfpnmc6ddt342we

Privacy preserving in ubiquitous computing: Classification & hierarchy

Tinghuai Ma, Sen Yan, Jin Wang, Sungyoung Lee
2011 Computer Science and Information Systems  
In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels  ...  In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers.  ...  the services in a secure and flexible way.  ... 
doi:10.2298/csis110315055m fatcat:3qbwa545zbf2xg474esifwlxsq

The Resurrecting Duckling: security issues for ubiquitous computing

F. Stajano, R. Anderson
2002 Computer  
The ubiquitous computing vision-of spontaneous interaction between the digital devices that surround and serve us-could bring a great deal of convenience but also a great deal of risk.  ...  If it takes off as anticipated, ubiquitous computing will have an impact on society similar to that of the Web. So its vulnerabilities will have major repercussions, and it is prudent  ...  The principal security issues for ubiquitous computing differ in a number of interesting ways from the protection issues in conventional distributed systems, but they are often similar to the issues in  ... 
doi:10.1109/mc.2002.1012427 fatcat:sb2f7b6sfzgmvbnenv2fhs5aea
« Previous Showing results 1 — 15 out of 39,172 results