A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
Information exposure control through data manipulation for ubiquitous computing
2005
Proceedings of the 2004 workshop on New security paradigms - NSPW '04
In this paper, we present our initial work on a novel paradigm for information security and privacy protection in the ubiquitous world. ...
Unlike in traditional, static, execution environments, information in the Ubiquitous world is exposed, throughout its lifetime, to constantly varying security and privacy threats caused by the inherent ...
Secondly, much of the today's ubiquitous devices' built-in functionality can be used for limited context inference. ...
doi:10.1145/1065907.1066036
dblp:conf/nspw/DragovicC04
fatcat:tpyqiefupvdinl6xcx6fqt2hyq
Security middleware approaches and issues for ubiquitous applications
2010
Computers and Mathematics with Applications
Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications. ...
Recently, ubiquitous computing and pervasive environments evolved tremendously and became an integral part of many fields and application domains. ...
We would also like to thank the anonymous reviewers for their valuable comments and suggestions that helped us produce a more concise article. ...
doi:10.1016/j.camwa.2010.01.009
fatcat:ds73w7jfo5ejvpdpwlgtmq2lba
Trust Information-Based Privacy Architecture for Ubiquitous Health
2013
JMIR mHealth and uHealth
The DS can also set policies for secondary use and reuse of health information. The architecture offers protection against privacy threats existing in ubiquitous environments. ...
Furthermore, the architecture should give feedback upon how systems follow the policies of DS and offer protection against privacy and trust threats existing in ubiquitous environments. ...
Acknowledgments The results presented in this paper are based on the findings of the Trusted eHealth and eWelfare Space (THEWS) project. ...
doi:10.2196/mhealth.2731
pmid:25099213
pmcid:PMC4114421
fatcat:4idxpcnb6raffasiljjrxtfpga
Towards a Component based Privacy Protector Architecture
2003
International Conference on Advanced Information Systems Engineering
In this paper, we discuss the requirements, functionalities and roles needed to support privacy protection in context aware mobile information systems. ...
The development of mobile communication technology and ubiquitous computing paradigm and the emergence of m-healthcare, m-business and m-education services have raised the urgency of dealing with personal ...
In this paper, although focus has been given to supporting mobile users explicit consent rather than security; we enunciate that security functionalities to be included, in the future, in the design and ...
dblp:conf/caise/EldinW03
fatcat:6imfwadxfnefpevzfzs2dx6adm
Formal Model based Specification of Authorization Framework for Ubiquitous Enterprise Computing Environment
2014
International Journal of Computer Applications
In this paper a formal authorization model for ubiquitous computing environment is proposed. ...
With the emergence of new dynamic computing environments, the traditional identity based authorization models are unable to meet multiple attribute based policy requirements through single function based ...
[13] in their paper presented a usage control model to protect services and devices in ubiquitous computing environments, which allows the access restrictions directly on services and object documents ...
doi:10.5120/16083-5220
fatcat:sm6s5lay5nburpzcrxqxnspsme
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
2009
2009 International Conference on Network-Based Information Systems
Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications. ...
This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. ...
Our survey focuses on security middleware particular to pervasive and ubiquitous environments.
III. ...
doi:10.1109/nbis.2009.31
dblp:conf/nbis/Al-JaroodiAAM09
fatcat:5mpt4b24cjhynhop3dveyrw6ve
KNOW Why your access was denied
2004
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
To achieve a balance between system usability and the protection of security policies, we present Know, a framework that uses Ordered Binary Decision Diagrams (OBDDs) and cost functions to provide feedback ...
Relevant feedback enhances system usability, especially in systems where permissions change in unpredictable ways depending on contextual information. ...
A Useful Cost Function We now present a useful cost function that improves on the results of the naïve cost function in the context of ubiquitous computing environments. ...
doi:10.1145/1030083.1030092
dblp:conf/ccs/KapadiaSC04
fatcat:aoxkyhzw6nf7pgkli36ee4q5x4
A Secure and Auto-configurable Environment for Mobile Agents in Ubiquitous Computing Scenarios
[chapter]
2006
Lecture Notes in Computer Science
In this paper we present a solution to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios. ...
Our approach is based on two main building blocks: trusted platforms and profiles. ...
A secure execution environment for agents in ubiquitous computing scenarios The main goal of this paper is to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing ...
doi:10.1007/11833529_99
fatcat:ofynghfd2ff7bbnqszyh7sbonq
Context-Aware Access Control for Resources in the Ubiquitous Learning System Using Ciphertext-Policy Attribute-based Encryption
2013
Pacific Asia Conference on Information Systems
the need of unknown user access control in ubiquitous learning environment. ...
Ubiquitous learning system based on cloud computing brings forth new challenges for resources security when owners outsource resources for sharing on cloud servers. ...
The scheme will be improved in our on-going and further work. ...
dblp:conf/pacis/YuCHW13
fatcat:xibi3yhlhfh2xjanofsvzhjp2i
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments
[chapter]
2005
Lecture Notes in Computer Science
In a Ubiquitous Computing environment, sensors are actively collecting data, much of which can be very sensitive. ...
Data will often be streaming at high rates (video and audio) and it must be dealt with in real-time. Protecting the privacy of users is of central importance. ...
This work was supported in part by National Science Foundation award #EIA-0122599 (Title: "ITR/SI: Societal Scale Information Systems: Technologies, Design, and Applications"). ...
doi:10.1007/11423409_11
fatcat:zxf2vk35lrdr5oiwr4subjvx44
Privacy Preservation Technologies in Internet of Things
[article]
2012
arXiv
pre-print
In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations. ...
In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. ...
In the following section, we describe the some examples that demonstrate how SMC approach may be used to ensure privacy preservation and protection in an ubiquitous computing environment.
III. ...
arXiv:1012.2177v3
fatcat:56copu3ttjgldcndfoab7sbs6a
Design of Authentication Model Preserving Intimacy and Trust in Intelligent Environments
2015
Network Protocols and Algorithms
In such context, security is still very fragile and there is often a violation of user privacy and service interference. For this, a special interest in ubiquitous network security is going up. ...
The authentication protocol is simple and secure, protects the privacy of user and aims to satisfy the security requirements. ...
While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored ...
doi:10.5296/npa.v7i1.7208
fatcat:e6e7cgyrafd6bpieam4syubimq
A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor
[chapter]
2008
Home Networking
Recently horne intelligent service is extended to context aware and situation aware automation service by using ubiquitous technology, In this paper, we focused on user's context based intelligent security ...
It will be a practical application of RFID and sensor network for ubiquitous horne safety environment. The proposed system has lots of advantages in user safety and energy efficiency. ...
Each policy contains a subject role(the subject on which the policy is to apply), and object role(the object to which the policy applies) and action(on the object), an environment role(the context of the ...
doi:10.1007/978-0-387-77216-5_16
dblp:conf/ifip6-2/LeeK07
fatcat:bwcn3cfkazezfpnmc6ddt342we
Privacy preserving in ubiquitous computing: Classification & hierarchy
2011
Computer Science and Information Systems
In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels ...
In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. ...
the services in a secure and flexible way. ...
doi:10.2298/csis110315055m
fatcat:3qbwa545zbf2xg474esifwlxsq
The Resurrecting Duckling: security issues for ubiquitous computing
2002
Computer
The ubiquitous computing vision-of spontaneous interaction between the digital devices that surround and serve us-could bring a great deal of convenience but also a great deal of risk. ...
If it takes off as anticipated, ubiquitous computing will have an impact on society similar to that of the Web. So its vulnerabilities will have major repercussions, and it is prudent ...
The principal security issues for ubiquitous computing differ in a number of interesting ways from the protection issues in conventional distributed systems, but they are often similar to the issues in ...
doi:10.1109/mc.2002.1012427
fatcat:sb2f7b6sfzgmvbnenv2fhs5aea
« Previous
Showing results 1 — 15 out of 39,172 results