首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In pervasive computing environments, users can get services anytime and anywhere, but the ubiquity and mobility of the environments bring new security challenges. The user and the service provider do not know each other in advance, they should mutually authenticate each other. The service provider pre-fers to authenticate the user based on his identity while the user tends to stay anonymous. Privacy and secu-rity are two important but seemingly contradictory objectives. As a result, a user prefers not to expose any sensitive information to the service provider such as his physical location, ID and so on when being authen-ticated. In this paper, a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed. Not only can a user’s anonymous authentication be achieved, but also the public key cryptography operations can be reduced by adopting this scheme. Different access control policies for differ-ent services are enabled by using biometric encryption technique. The correctness of the proposed authenti-cation and key establishment protocol is formally verified based on SVO logic.  相似文献   

2.
Pervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two heterogeneous deniable authentication protocols for pervasive computing environments using bilinear pairings. The first protocol allows a sender in a public key infrastructure (PKI) environment to send a message to a receiver in an identity-based cryptography (IBC) environment. The second protocol allows a sender in the IBC environment to send a message to a receiver in the PKI environment. Our protocols admits formal security proof in the random oracle model under the bilinear Diffie–Hellman assumption. In addition, our protocols support batch verification that can speed up the verification of authenticators. The characteristic makes our protocols useful in pervasive computing environments.  相似文献   

3.
The Green Project created Java specifically for an embedded device, a handheld wireless PDA (persnal digital assistant) that was never released as a product. However, Java was launched as a new Internet language. Over time, it became popular for building desktop applications, Web services, and ubiquitous systems, partly because of its "write once, run anywhere" promise. There's no doubt that Java and PDAs are a powerful combination. In Java Development on PDAs: Building Applications for PocketPC and Palm Devices, the author writes that Java developers often have a preconception that having to choose a hardware platform is a concern of the past, since Java runs on any platform. The author discusses portability issues between the PocketPC and PalmOS devices.  相似文献   

4.
The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of current Grid authorisation solutions when applied to Pervasive Grid environments. The key authorisation requirements for Pervasive Grid computing are identified and a novel Grid authorisation framework, the context-constrained authorisation framework CoCoA, is proposed. The CoCoA framework takes into account not only users’ static attributes, but also their dynamic contextual attributes that are inherent in Pervasive computing. It adheres to open Grid standards, uses a modular layered approach to complement existing Grid authorisation systems, and inter-works with other Grid security building blocks. A prototype implementation of the CoCoA framework is presented and its performance evaluated.  相似文献   

5.
《Spectrum, IEEE》1992,29(10):22-23
The power of the net of electronic mail networks now embracing the globe, which transcends national, corporate, and ethnic boundaries, is discussed. Negative aspects and improvements on the horizon are briefly examined  相似文献   

6.
针对普适计算环境中涌现出的行为可信问题,提出了一种适合于普适计算网络环境的上下文感知的自适应可信模型CASATM,该可信模型能够自适应地对不同的服务提供不同层次的安全保障,能有效地对时间、地点、服务内容等上下文感知.同时提出了一种简单高效的风险评估模型来完成对一些完全陌生客体的可信度初始化.仿真实验表明该可信模型能有效地感知上下文并抵抗恶意客体的周期性欺骗行为.  相似文献   

7.
The last years have been characterized by an increasing interest in the grid and cloud computing that allow the implementation of high performance computing structures in a distributed way by exploiting multiple processing resources. The presence of mobile terminals has extended the paradigm to the so called pervasive grid networks, where multiple heterogeneous devices are interconnected to form a distributed computing resource. In such a scenario, there is the need of efficient techniques for providing reliable wireless connections among network nodes. This paper deals with the proposal of a suitable resource management scheme relying on a routing algorithm able to perform jointly the resource discovery and task scheduling for implementing an efficient pervasive grid infrastructure in a wireless ad hoc scenario. The proposed solutions have been considered within two different parallelization processing schemes, and their effectiveness has been verified by resorting to computer simulations. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

8.
As people use computers more and more, it's increasingly challenging to ensure they can all interact and share data without making proprietary or personal information too widely available to others. The Cambridge-MIT Institute is focusing its research efforts on pervasive computing challenges, including security, networking, and user interfaces. CMI invests more than US$5 million to explore ways to make computers more responsive to human needs, reducing the amount of effort people must spend interacting with the growing number of systems used in everyday life  相似文献   

9.
10.
Mobile computing environments increasingly consist of a range of supporting technologies offering a diverse set of capabilities to applications and end-systems. Such environments are characterised by sudden and dramatic changes in the quality-of-service (QoS) available to applications and users. Recent work has shown that distributed systems platforms can assist applications to take advantage of these changes in QoS and, more specifically, facilitate applications to adapt to their environment. However, the current state-of-the-art in these platforms reflects their fixed network origins through their choice of synchronous connection-oriented communications paradigms. In this paper we argue that these paradigms are not well suited to operation in the emerging mobile environments. Furthermore, we offer an alternative programming paradigm based on tuple spaces which, we believe, offers a number of benefits within a mobile context. The paper presents the design, implementation and evaluation of a new platform based on this paradigm. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   

11.
Spohrer  J. Stein  M. 《Multimedia, IEEE》2000,7(1):12-17
The pervasive computing age will provide easier and more satisfying ways for people to interact with their world. As a result, the ways we interact with people, information, organizations, processes, devices, appliances, places, and everyday things will change. We describe four aspects of living in the pervasive computing age from a user experience perspective: life networks will make it easy to capture, store, access, and process everything as information that flows to where authorized users need it; in attentive environments, inanimate things will seemingly become attentive and gain virtual affordances, providing users with responsive digital servants that respect privacy; with WorldBoard-like services, information will appear to exist in real places, providing users with enhanced information perception services; and intermediaries will enhance the flow of information, allowing users to get information the way they want it and securely provide personal information only when appropriate. These changes will affect the nature of information itself and provide us with many new ways to access it. We set the stage by providing an overview of some technology drivers such as improved communication, storage, processing, identification tags, sensors, displays, interaction technologies, and software technologies  相似文献   

12.
13.
14.
15.
普适环境中基于身份的跨域认证方案   总被引:1,自引:0,他引:1  
利用椭圆曲线加法群提出了一种基于身份的签名算法,算法中签名的验证结果相对于签名者身份是一个常量,该算法可保证跨域认证中用户身份的匿名性,并且避免了复杂的双线性对运算.基于该算法设计了一种普适环境中的跨域认证方案,方案中用户利用该算法对时戳签名作为认证信息,在实现安全跨域认证的同时实现了用户匿名性.分析表明,该方案同时具...  相似文献   

16.
Pervasive computing is expected to enter our everyday life in the foreseeable future. The capabilities of the devices, which operate in such an environment, as well as the range of services offered to the end-users are expected to be significantly increased. However, this new era is expected to have a serious effect on privacy. In this paper, we first refer to the privacy threats identified in a pervasive environment; then, we present a set of principles for ensuring privacy in this context. In the sequel, we examine a number of privacy protection mechanisms for pervasive systems, with a focus on the level of anonymity offered to the end-users. We identify flaws, these mechanisms suffer by, in terms of the limited anonymity level they offer. We conclude by presenting a set of essential actions one should take into account, in order to ensure user’s anonymity in a pervasive computing environment.  相似文献   

17.
许剑  靳莉 《电信科学》2020,36(7):163-167
提出一种基于一致的API访问不同云的可量化安全评估模型。评估系统包括安全扫描引擎模块、安全恢复引擎模块、安全量化评估模块、可视化显示模块等。介绍了安全评估过程及修复过程,并基于G-Cloud平台进行了仿真验证。结果显示,所提模型可以通过可视化图形显示一个或多个云的动态安全扫描评分,能够引导用电用户修改配置、改进操作、修复漏洞,提高云用电资源的安全性。  相似文献   

18.
云资源管理中负载失衡将使得在云安全管理平台中执行并行任务时的节点产生负载失衡问题,导致云安全管理平台安全性能降低,出现资源浪费问题。因此,提出一种基于负载均衡的云安全管理平台的设计方法,该云安全管理平台包括网络安全设备模块、数据获取和操作模块、云服务模块以及用户交互模块。采用基于负载均衡的云资源调度模型实现云安全管理平台中资源的合理分配,确保平台的安全性。该调度模型包括云服务、方案域以及资源域。通常采用融合辅助的方法,完成云资源的调度。按照服务种类把用户申请反馈给相关的方案集中,方案集选用合理的负载均衡方法对系统负载进行平衡。实验结果表明,云安全管理平台调度具有较低的吞吐量和响应时间,并且负载均衡度较高,满足云安全管理平台均衡设计的要求。  相似文献   

19.
随着计算机技术的飞速发展,将普适计算引入到智能校园系统的设计这一思想已日趋成熟,而上下文感知功能作为一个重要的研究方向,已经成为普适计算实现的必要条件,本文就普适计算对智能校园建设进行了全方面的分析研究.  相似文献   

20.
Pervasive computing,which requires applications composed of independent and distributed components,is an important domain for dynamic ubiquitous heterogeneous environment.However,one of the critical challenges it faces is resource allocation.To overcome the difficulty,enhanced universal service terminal(UST+) is designed as a reflective middleware combined distributed components with particular features to achieve user goals.Moreover,a novel algorithm based on microeconomics is presented to resolve conflict...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号