共查询到20条相似文献,搜索用时 15 毫秒
1.
In pervasive computing environments, users can get services anytime and anywhere, but the ubiquity and mobility of the environments bring new security challenges. The user and the service provider do not know each other in advance, they should mutually authenticate each other. The service provider pre-fers to authenticate the user based on his identity while the user tends to stay anonymous. Privacy and secu-rity are two important but seemingly contradictory objectives. As a result, a user prefers not to expose any sensitive information to the service provider such as his physical location, ID and so on when being authen-ticated. In this paper, a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed. Not only can a user’s anonymous authentication be achieved, but also the public key cryptography operations can be reduced by adopting this scheme. Different access control policies for differ-ent services are enabled by using biometric encryption technique. The correctness of the proposed authenti-cation and key establishment protocol is formally verified based on SVO logic. 相似文献
2.
Pervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two heterogeneous deniable authentication protocols for pervasive computing environments using bilinear pairings. The first protocol allows a sender in a public key infrastructure (PKI) environment to send a message to a receiver in an identity-based cryptography (IBC) environment. The second protocol allows a sender in the IBC environment to send a message to a receiver in the PKI environment. Our protocols admits formal security proof in the random oracle model under the bilinear Diffie–Hellman assumption. In addition, our protocols support batch verification that can speed up the verification of authenticators. The characteristic makes our protocols useful in pervasive computing environments. 相似文献
3.
《Distributed Systems Online, IEEE》2005,6(6)
The Green Project created Java specifically for an embedded device, a handheld wireless PDA (persnal digital assistant) that was never released as a product. However, Java was launched as a new Internet language. Over time, it became popular for building desktop applications, Web services, and ubiquitous systems, partly because of its "write once, run anywhere" promise. There's no doubt that Java and PDAs are a powerful combination. In Java Development on PDAs: Building Applications for PocketPC and Palm Devices, the author writes that Java developers often have a preconception that having to choose a hardware platform is a concern of the past, since Java runs on any platform. The author discusses portability issues between the PocketPC and PalmOS devices. 相似文献
4.
The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of
current Grid authorisation solutions when applied to Pervasive Grid environments. The key authorisation requirements for Pervasive
Grid computing are identified and a novel Grid authorisation framework, the context-constrained authorisation framework CoCoA,
is proposed. The CoCoA framework takes into account not only users’ static attributes, but also their dynamic contextual attributes
that are inherent in Pervasive computing. It adheres to open Grid standards, uses a modular layered approach to complement
existing Grid authorisation systems, and inter-works with other Grid security building blocks. A prototype implementation
of the CoCoA framework is presented and its performance evaluated. 相似文献
5.
《Spectrum, IEEE》1992,29(10):22-23
The power of the net of electronic mail networks now embracing the globe, which transcends national, corporate, and ethnic boundaries, is discussed. Negative aspects and improvements on the horizon are briefly examined 相似文献
6.
7.
Daniele Tarchi Andrea Tassi Romano Fantacci 《Wireless Communications and Mobile Computing》2013,13(14):1309-1323
The last years have been characterized by an increasing interest in the grid and cloud computing that allow the implementation of high performance computing structures in a distributed way by exploiting multiple processing resources. The presence of mobile terminals has extended the paradigm to the so called pervasive grid networks, where multiple heterogeneous devices are interconnected to form a distributed computing resource. In such a scenario, there is the need of efficient techniques for providing reliable wireless connections among network nodes. This paper deals with the proposal of a suitable resource management scheme relying on a routing algorithm able to perform jointly the resource discovery and task scheduling for implementing an efficient pervasive grid infrastructure in a wireless ad hoc scenario. The proposed solutions have been considered within two different parallelization processing schemes, and their effectiveness has been verified by resorting to computer simulations. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
8.
《Distributed Systems Online, IEEE》2004,5(6):2
As people use computers more and more, it's increasingly challenging to ensure they can all interact and share data without making proprietary or personal information too widely available to others. The Cambridge-MIT Institute is focusing its research efforts on pervasive computing challenges, including security, networking, and user interfaces. CMI invests more than US$5 million to explore ways to make computers more responsive to human needs, reducing the amount of effort people must spend interacting with the growing number of systems used in everyday life 相似文献
9.
10.
Davies Nigel Friday Adrian Wade Stephen P. Blair Gordon S. 《Mobile Networks and Applications》1998,3(2):143-156
Mobile computing environments increasingly consist of a range of supporting technologies offering a diverse set of capabilities
to applications and end-systems. Such environments are characterised by sudden and dramatic changes in the quality-of-service
(QoS) available to applications and users. Recent work has shown that distributed systems platforms can assist applications
to take advantage of these changes in QoS and, more specifically, facilitate applications to adapt to their environment. However,
the current state-of-the-art in these platforms reflects their fixed network origins through their choice of synchronous connection-oriented
communications paradigms. In this paper we argue that these paradigms are not well suited to operation in the emerging mobile
environments. Furthermore, we offer an alternative programming paradigm based on tuple spaces which, we believe, offers a
number of benefits within a mobile context. The paper presents the design, implementation and evaluation of a new platform
based on this paradigm.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
11.
The pervasive computing age will provide easier and more satisfying ways for people to interact with their world. As a result, the ways we interact with people, information, organizations, processes, devices, appliances, places, and everyday things will change. We describe four aspects of living in the pervasive computing age from a user experience perspective: life networks will make it easy to capture, store, access, and process everything as information that flows to where authorized users need it; in attentive environments, inanimate things will seemingly become attentive and gain virtual affordances, providing users with responsive digital servants that respect privacy; with WorldBoard-like services, information will appear to exist in real places, providing users with enhanced information perception services; and intermediaries will enhance the flow of information, allowing users to get information the way they want it and securely provide personal information only when appropriate. These changes will affect the nature of information itself and provide us with many new ways to access it. We set the stage by providing an overview of some technology drivers such as improved communication, storage, processing, identification tags, sensors, displays, interaction technologies, and software technologies 相似文献
12.
13.
14.
15.
16.
《Telematics and Informatics》2006,23(3):196-210
Pervasive computing is expected to enter our everyday life in the foreseeable future. The capabilities of the devices, which operate in such an environment, as well as the range of services offered to the end-users are expected to be significantly increased. However, this new era is expected to have a serious effect on privacy. In this paper, we first refer to the privacy threats identified in a pervasive environment; then, we present a set of principles for ensuring privacy in this context. In the sequel, we examine a number of privacy protection mechanisms for pervasive systems, with a focus on the level of anonymity offered to the end-users. We identify flaws, these mechanisms suffer by, in terms of the limited anonymity level they offer. We conclude by presenting a set of essential actions one should take into account, in order to ensure user’s anonymity in a pervasive computing environment. 相似文献
17.
18.
云资源管理中负载失衡将使得在云安全管理平台中执行并行任务时的节点产生负载失衡问题,导致云安全管理平台安全性能降低,出现资源浪费问题。因此,提出一种基于负载均衡的云安全管理平台的设计方法,该云安全管理平台包括网络安全设备模块、数据获取和操作模块、云服务模块以及用户交互模块。采用基于负载均衡的云资源调度模型实现云安全管理平台中资源的合理分配,确保平台的安全性。该调度模型包括云服务、方案域以及资源域。通常采用融合辅助的方法,完成云资源的调度。按照服务种类把用户申请反馈给相关的方案集中,方案集选用合理的负载均衡方法对系统负载进行平衡。实验结果表明,云安全管理平台调度具有较低的吞吐量和响应时间,并且负载均衡度较高,满足云安全管理平台均衡设计的要求。 相似文献
19.
随着计算机技术的飞速发展,将普适计算引入到智能校园系统的设计这一思想已日趋成熟,而上下文感知功能作为一个重要的研究方向,已经成为普适计算实现的必要条件,本文就普适计算对智能校园建设进行了全方面的分析研究. 相似文献
20.
Pervasive computing,which requires applications composed of independent and distributed components,is an important domain for dynamic ubiquitous heterogeneous environment.However,one of the critical challenges it faces is resource allocation.To overcome the difficulty,enhanced universal service terminal(UST+) is designed as a reflective middleware combined distributed components with particular features to achieve user goals.Moreover,a novel algorithm based on microeconomics is presented to resolve conflict... 相似文献