Filters








85,486 Hits in 2.8 sec

Security in Pervasive Computing [chapter]

Frank Stajano
2004 Lecture Notes in Computer Science  
A central new problem in the pervasive computing scenario is therefore that of "Secure Transient Association": pairing up a master and a slave device so that the slave will obey the master, will stay faithful  ...  Authentication is an area in which the advent of pervasive computing will require new ideas and new strategies.  ... 
doi:10.1007/978-3-540-39881-3_3 fatcat:ciwjiqibi5eubfxsgdqwoy3voy

Security and Privacy in Pervasive Computing

Charalampos Patrikakis, Pantelis Karamolegkos, Athanasios Voulodimos, Mohd Helmy Abd Wahab, Nik Shahidah Afifi Mohd Taujuddin, Christina Hanif, Linda Pareschi, Daniele Riboni, Stefan G. Weber, Andreas Heinemann, Sen-ching Samson Cheung, Jayahsri Chaudhari (+1 others)
2007 IEEE pervasive computing  
The remaining three projects are investigating various types of privacy protection mechanisms for data collected in pervasive computing environments, by attestation services, and by voice recording systems  ...  Joseph EDITOR'S INTRO Concerned Little to none Good to excellent Unconcerned Technological awareness Security/ privacy User B User A Figure 1.  ...  Joseph ■ UC Berkeley ■ adja@cs.berkeley.edu Security and Privacy in Pervasive Computing 1536-1268/07/$25.00 © 2007 IEEE ■ Published by the IEEE Computer Society PERVASIVE computing 73  ... 
doi:10.1109/mprv.2007.86 fatcat:awoo5tqp5reyrbayl7rycnuptm

Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing [chapter]

Jabeom Gu, Sehyun Park, Jaehoon Nah, Sungwon Sohn, Ohyoung Song
2004 Lecture Notes in Computer Science  
In this paper, we introduce a new security paradigm, called security dustering, for pervasive computing environment that enables network-wide defend agairrst increasing evolutionary attacks on the heterogeneaus  ...  Security dustering make use of dynamic security context exchange between duster members and distributed information sharing to achieve scalable and efficient cooperation.  ...  In this paper, we focus on how the pervasive computing environment can have networkwide defending mechanism against attacks.  ... 
doi:10.1007/978-3-540-24693-0_114 fatcat:sqfxwhy3dfgurealt2xinndlfq

Delegating Secure Logging in Pervasive Computing Systems [chapter]

Rafael Accorsi, Adolf Hohl
2006 Lecture Notes in Computer Science  
While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems.  ...  In this context, we present two contributions addressing this problem. First, we develop an approach to securely log information in marginally trusted collectors.  ...  An Approach to Security Logging Our method to providing secure logging services in pervasive computing systems builds on and extends the techniques proposed in [25] .  ... 
doi:10.1007/11734666_6 fatcat:nqpvvag2hfgu3i56xjizfmogj4

Reconciling privacy and security in pervasive computing

Ian Wakeman, Dan Chalmers, Michael Fry
2007 Proceedings of the 5th international workshop on Middleware for pervasive and ad-hoc computing held at the ACM/IFIP/USENIX 8th International Middleware Conference - MPAC '07  
Keywords Pervasive Computing, Homomorphic Cryptography, Access Control 1.  ...  We present a novel pseudonym generation mechanism suitable for use in groups without a centralised administration.  ...  INTRODUCTION As is described in the first sentence of nearly every pervasive computing research paper, our aim is to enable Marc Weiser's vision of ubiquitous computing.  ... 
doi:10.1145/1376866.1376868 dblp:conf/middleware/WakemanCF07 fatcat:uzuw57v675csncy5smia3acatu

Trust-based security in pervasive computing environments

L. Kagal, T. Finin, A. Joshi
2001 Computer  
Acknowledgments This research was supported in part by the IBM EECOMS program and by the DARPA DAML program under contract F30602-97-1-0215, NSF CCR0070802, 1159875433.  ...  can't be made in a pervasive computing scenario.  ...  This scenario demonstrates the importance of trust over traditional security mechanisms in a pervasive computing environment.  ... 
doi:10.1109/2.970591 fatcat:mbjvstfakrh4redptfa43o6rhy

Security in ad hoc networks and pervasive computing

Isaac Z. Wu, X.-Y. Li, M. Song, C.-M. Liu
2010 Security and Communication Networks  
The special issue is intended to foster state-of-theart research in the area of security in ad hoc networks and pervasive computing.  ...  This special issue is focused on various aspects of security in ad hoc networks and pervasive computing research and development to report both in-depth research and applications-oriented works.  ... 
doi:10.1002/sec.202 fatcat:z47aflkvgfg5paoel3rztdcdjq

Security in Pervasive Computing: Current Status and Open Issues

Munirul M. Haque, Sheikh Iqbal Ahamed
2006 International Journal of Network Security  
Security in pervasive computing is the most critical challenge. Security is needed to ensure exact and accurate confidentiality, integrity, authentication, and access control, to name a few.  ...  As pervasive devices become incorporated in our day-to-day lives, security will increasingly becoming a common concern for all users --though for most it will be an afterthought, like many other computing  ...  Acknowledgement The authors would like to thank Paula Stroud for her valuable assistance in improving the paper.  ... 
dblp:journals/ijnsec/HaqueA06 fatcat:qvinqrcjn5gedaribcdjuyl44m

Dissecting the Security and Protection Issues in Pervasive Computing

Qaisar Javaid, Humera Yasmeen, Munam Ali Shah, Muhammad Kamran, Adnan Sohail
2018 Mehran University Research Journal of Engineering and Technology  
This computing capacity available in most of the daily use devices is characterized as pervasive computing. Pervasive computing is often referred as mobile computing or nomadic computing. 1.  ...  It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user  ...  Dissecting the Security and Protection Issues in Pervasive Computing A term "Pervasive" comes near to the impression of ubiquity or submerging [1] .  ... 
doi:10.22581/muet1982.1802.02 fatcat:cua5uvixt5eopnu5vvjbojhnjq

Privacy, Security and Trust Related Issues in Pervasive Computing

Rohit Tiwari, Monika Kohli
2018 IJARCCE  
is there having privacy and security issues in pervasive computing environments, which are, unfortunately, not delved into an appropriate extent.  ...  In this paper, the authors are putting their combined efforts to explore the challenges for security and privacy into pervasive computing environments.  ...  The author would also thank the KJIT management for their astonishing support in the research.  ... 
doi:10.17148/ijarcce.2018.7109 fatcat:a67cttf6vjf5fjwuioqxjvm2cu

Advances in security and multimodality for pervasive computing environments

Jong Hyuk Park, Ching-Hsien Hsu, Naveen Chilamkurti, Mieso Denko
2011 Telecommunications Systems  
Pervasive computing environments (PE) present specific peculiarities with respect to aspects like security and multimodality.  ...  Pervasive computing or ubiquitous computing calls for the deployment of a wide variety of smart devices throughout our working and living spaces.  ...  • Human oriented interfaces • Virtual reality and ubiquitous computingSecurity standards for next pervasive computing • Key management and authentication in pervasive computingSecurity in Human  ... 
doi:10.1007/s11235-011-9646-6 fatcat:2bls7y64enfktpcabe3fpxwhxy

Security for Whom? The Shifting Security Assumptions of Pervasive Computing [chapter]

Frank Stajano
2003 Lecture Notes in Computer Science  
In this paper we examine new security issues for pervasive computing including authentication, biometrics and digital rights management.  ...  Pervasive computing will introduce hundreds of computing devices per user. This change is of such magnitude that it is qualitative as well as quantitative.  ...  Going up a level, I am also grateful to all the responsible computer professionals (some of whom appear in the bibliography) who are raising awareness of the security issues of ubicomp.  ... 
doi:10.1007/3-540-36532-x_2 fatcat:w5rxiel6ifhtnhhiwra3huzvuy

Secured Smart System Desing in Pervasive Computing Environment Using VCS

Varaprasad Rao M, Bharta Chryulu N Ch
2015 International Journal of UbiComp  
In this paper, we made an attempt to propose a new security algorithm for providing security to Pervasive Computing Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security  ...  Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors embedded in mobile phones.  ...  CONCLUSION In this paper, we made an attempt to propose a new security algorithm for providing confidentiality and authentication credentials in Pervasive Computing Environment (PCE) system using Public-key  ... 
doi:10.5121/iju.2015.6202 fatcat:bu5dnfv7gffgfju3qmubngolpq

Remote Management and Secure Application Development for Pervasive Home Systems Using JASON

Bert Bos, Lukasz Chmielewski, Jaap-Henk Hoepman, Thanh Son Nguyen
2007 Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007)  
And they start disappearing in the environment, forming a truly pervasive home system.  ...  The embedded devices in such pervasive networks are usually owned and managed by several entities with conflicting interests. This makes secure remote management of such devices a challenging task.  ...  Pervasive computing (also known as ubiquitous computing, everyware [5] etc.) refers to the integration of systems into their environment, to build context-aware systems and services that are invisible  ... 
doi:10.1109/secperu.2007.9 dblp:conf/secperu/BosCHN07 fatcat:aqkogsxwknbtpkp3tz76fgnj5u

Pervasive Computing Applications and Security – A Deep Insight [chapter]

S. Magesh, Sujatha Jamuna Anand, Niveditha V.R, Y. Pavan Kumar Reddy, P.S. Rajakumar
2021 Advances in Parallel Computing  
Pervasive computing has made life easy with communication devices. Today devise collaboration has enhanced everywhere in this environment. It has made computing devices invisible and the services.  ...  The smart applications with smart environments perhaps force towards the new technologies in the pervasive computing outlook.  ...  Today Pervasive computing has expanded transparently in many environments.  ... 
doi:10.3233/apc210193 fatcat:kgu545sg5jcpbmddf6p5aaaw5e
« Previous Showing results 1 — 15 out of 85,486 results