Traditional authentication and access control are no longer suitable for ubiquitous computing paradigm. They are only effective if the system knows in advance which users are going to access and what their access rights are. Therefore, it calls for a novel security model. In this paper, we outline major security problems in ubiquitous computing and propose a new architecture, TBSI (Trust-based Security Infrastructure). In TBSI, trust and risk management plays a key role to support authentication and authorization to unknown users. Meanwhile, intrusion detection and home firewall are also integrated to make TBSI more robust. This paper is an extension of our previous work to give more detailed description and enhancement of the architecture....
Security of context-aware ubiquitous systems is paramount, and authentication plays an important asp...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
Abstract. In Ubiquitous Computing Environment (UCE), service provider wants to provide its service t...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces ...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
Abstract. The ubiquitous computing paradigm suggests that we are going to be surrounded by countless...
Modern technology and omnipresent computing and communication facilities are leading us closer to th...
A significant characteristic of ubiquitous computing is the need for interactions of highly mobile e...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
This paper appears in: Distributed Computing Systems Workshops, 2002. Proceedings. 22nd Internationa...
In a pervasive computing environment, principle authentication veries if a person is the one he clai...
The purpose of ubiquitous computing is anywhere and anytime access to information within computing i...
[[abstract]]In ubiquitous computing, many computers serve each person at any time and any place. The...
Security of context-aware ubiquitous systems is paramount, and authentication plays an important asp...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
Abstract. In Ubiquitous Computing Environment (UCE), service provider wants to provide its service t...
Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physi...
Abstract – The deficient of a good authentication protocol in a ubiquitous application environment h...
Ubiquitous computing is revolutionizing the way applications, users, resources, and physical spaces ...
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that rais...
Abstract. The ubiquitous computing paradigm suggests that we are going to be surrounded by countless...
Modern technology and omnipresent computing and communication facilities are leading us closer to th...
A significant characteristic of ubiquitous computing is the need for interactions of highly mobile e...
As advances in mobile and embedded technologies coupled with progress in adhoc networking fuel the s...
This paper appears in: Distributed Computing Systems Workshops, 2002. Proceedings. 22nd Internationa...
In a pervasive computing environment, principle authentication veries if a person is the one he clai...
The purpose of ubiquitous computing is anywhere and anytime access to information within computing i...
[[abstract]]In ubiquitous computing, many computers serve each person at any time and any place. The...
Security of context-aware ubiquitous systems is paramount, and authentication plays an important asp...
In the ubiquitous computing environment of wireless access control, access is granted on having succ...
Abstract. In Ubiquitous Computing Environment (UCE), service provider wants to provide its service t...