Smart spaces, which utilize publish and subscribe architectures as well as semantic information, promise to ease cooperation of heterogeneous devices. To make smart spaces feasible for open multi-user environments we must provide easy-to-use security solutions. In this paper, we focus on security deployment issues, particularly to credential establishment and configuration of access control. The paper concentrates on challenges caused by heterogeneity of devices as well as dynamic nature of users, authorities, and security policies. To address these issues, the paper describes how credentials can be deployed in Smart Space architecture and how access control policies can be generated using available semantic information. Finally, the paper ...
The increasing use of Internet of Things (IoT) devices raises security and privacy concerns. In smar...
International audienceNext generation infrastructures will be deeply impacted by the introduction of...
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
Smart spaces, which utilize publish and subscribe architectures as well as semantic information, pro...
Smart spaces enable heterogeneous devices to cooperate dynamically in various environments. They can...
Smart spaces are dynamic environments for sharing information e.g. in personal, building, or public ...
Our living environments are full of various connected computing devices. These environments in homes...
Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to ant...
Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to ant...
Access control mechanisms play a key role in many areas of computer science, however, for the inform...
Smart spaces are dynamic environments for sharing device information. Key challenges for smart space...
Smart Spaces are composed of heterogeneous sensors and devices that collect and share information. T...
Abstract: More powerful smart devices come onto the market and into the hands of consumers every yea...
One of the main security problems of Smart-M3 platform is a lack of dynamic security management supp...
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
The increasing use of Internet of Things (IoT) devices raises security and privacy concerns. In smar...
International audienceNext generation infrastructures will be deeply impacted by the introduction of...
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
Smart spaces, which utilize publish and subscribe architectures as well as semantic information, pro...
Smart spaces enable heterogeneous devices to cooperate dynamically in various environments. They can...
Smart spaces are dynamic environments for sharing information e.g. in personal, building, or public ...
Our living environments are full of various connected computing devices. These environments in homes...
Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to ant...
Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to ant...
Access control mechanisms play a key role in many areas of computer science, however, for the inform...
Smart spaces are dynamic environments for sharing device information. Key challenges for smart space...
Smart Spaces are composed of heterogeneous sensors and devices that collect and share information. T...
Abstract: More powerful smart devices come onto the market and into the hands of consumers every yea...
One of the main security problems of Smart-M3 platform is a lack of dynamic security management supp...
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....
The increasing use of Internet of Things (IoT) devices raises security and privacy concerns. In smar...
International audienceNext generation infrastructures will be deeply impacted by the introduction of...
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities....