共查询到20条相似文献,搜索用时 0 毫秒
1.
Pervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two heterogeneous deniable authentication protocols for pervasive computing environments using bilinear pairings. The first protocol allows a sender in a public key infrastructure (PKI) environment to send a message to a receiver in an identity-based cryptography (IBC) environment. The second protocol allows a sender in the IBC environment to send a message to a receiver in the PKI environment. Our protocols admits formal security proof in the random oracle model under the bilinear Diffie–Hellman assumption. In addition, our protocols support batch verification that can speed up the verification of authenticators. The characteristic makes our protocols useful in pervasive computing environments. 相似文献
2.
《Distributed Systems Online, IEEE》2005,6(6)
The Green Project created Java specifically for an embedded device, a handheld wireless PDA (persnal digital assistant) that was never released as a product. However, Java was launched as a new Internet language. Over time, it became popular for building desktop applications, Web services, and ubiquitous systems, partly because of its "write once, run anywhere" promise. There's no doubt that Java and PDAs are a powerful combination. In Java Development on PDAs: Building Applications for PocketPC and Palm Devices, the author writes that Java developers often have a preconception that having to choose a hardware platform is a concern of the past, since Java runs on any platform. The author discusses portability issues between the PocketPC and PalmOS devices. 相似文献
3.
The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of
current Grid authorisation solutions when applied to Pervasive Grid environments. The key authorisation requirements for Pervasive
Grid computing are identified and a novel Grid authorisation framework, the context-constrained authorisation framework CoCoA,
is proposed. The CoCoA framework takes into account not only users’ static attributes, but also their dynamic contextual attributes
that are inherent in Pervasive computing. It adheres to open Grid standards, uses a modular layered approach to complement
existing Grid authorisation systems, and inter-works with other Grid security building blocks. A prototype implementation
of the CoCoA framework is presented and its performance evaluated. 相似文献
4.
《Spectrum, IEEE》1992,29(10):22-23
The power of the net of electronic mail networks now embracing the globe, which transcends national, corporate, and ethnic boundaries, is discussed. Negative aspects and improvements on the horizon are briefly examined 相似文献
5.
《Distributed Systems Online, IEEE》2004,5(6):2
As people use computers more and more, it's increasingly challenging to ensure they can all interact and share data without making proprietary or personal information too widely available to others. The Cambridge-MIT Institute is focusing its research efforts on pervasive computing challenges, including security, networking, and user interfaces. CMI invests more than US$5 million to explore ways to make computers more responsive to human needs, reducing the amount of effort people must spend interacting with the growing number of systems used in everyday life 相似文献
6.
Davies Nigel Friday Adrian Wade Stephen P. Blair Gordon S. 《Mobile Networks and Applications》1998,3(2):143-156
Mobile computing environments increasingly consist of a range of supporting technologies offering a diverse set of capabilities
to applications and end-systems. Such environments are characterised by sudden and dramatic changes in the quality-of-service
(QoS) available to applications and users. Recent work has shown that distributed systems platforms can assist applications
to take advantage of these changes in QoS and, more specifically, facilitate applications to adapt to their environment. However,
the current state-of-the-art in these platforms reflects their fixed network origins through their choice of synchronous connection-oriented
communications paradigms. In this paper we argue that these paradigms are not well suited to operation in the emerging mobile
environments. Furthermore, we offer an alternative programming paradigm based on tuple spaces which, we believe, offers a
number of benefits within a mobile context. The paper presents the design, implementation and evaluation of a new platform
based on this paradigm.
This revised version was published online in June 2006 with corrections to the Cover Date. 相似文献
7.
8.
9.
The pervasive computing age will provide easier and more satisfying ways for people to interact with their world. As a result, the ways we interact with people, information, organizations, processes, devices, appliances, places, and everyday things will change. We describe four aspects of living in the pervasive computing age from a user experience perspective: life networks will make it easy to capture, store, access, and process everything as information that flows to where authorized users need it; in attentive environments, inanimate things will seemingly become attentive and gain virtual affordances, providing users with responsive digital servants that respect privacy; with WorldBoard-like services, information will appear to exist in real places, providing users with enhanced information perception services; and intermediaries will enhance the flow of information, allowing users to get information the way they want it and securely provide personal information only when appropriate. These changes will affect the nature of information itself and provide us with many new ways to access it. We set the stage by providing an overview of some technology drivers such as improved communication, storage, processing, identification tags, sensors, displays, interaction technologies, and software technologies 相似文献
10.
11.
12.
《Telematics and Informatics》2006,23(3):196-210
Pervasive computing is expected to enter our everyday life in the foreseeable future. The capabilities of the devices, which operate in such an environment, as well as the range of services offered to the end-users are expected to be significantly increased. However, this new era is expected to have a serious effect on privacy. In this paper, we first refer to the privacy threats identified in a pervasive environment; then, we present a set of principles for ensuring privacy in this context. In the sequel, we examine a number of privacy protection mechanisms for pervasive systems, with a focus on the level of anonymity offered to the end-users. We identify flaws, these mechanisms suffer by, in terms of the limited anonymity level they offer. We conclude by presenting a set of essential actions one should take into account, in order to ensure user’s anonymity in a pervasive computing environment. 相似文献
13.
云资源管理中负载失衡将使得在云安全管理平台中执行并行任务时的节点产生负载失衡问题,导致云安全管理平台安全性能降低,出现资源浪费问题。因此,提出一种基于负载均衡的云安全管理平台的设计方法,该云安全管理平台包括网络安全设备模块、数据获取和操作模块、云服务模块以及用户交互模块。采用基于负载均衡的云资源调度模型实现云安全管理平台中资源的合理分配,确保平台的安全性。该调度模型包括云服务、方案域以及资源域。通常采用融合辅助的方法,完成云资源的调度。按照服务种类把用户申请反馈给相关的方案集中,方案集选用合理的负载均衡方法对系统负载进行平衡。实验结果表明,云安全管理平台调度具有较低的吞吐量和响应时间,并且负载均衡度较高,满足云安全管理平台均衡设计的要求。 相似文献
14.
随着计算机技术的飞速发展,将普适计算引入到智能校园系统的设计这一思想已日趋成熟,而上下文感知功能作为一个重要的研究方向,已经成为普适计算实现的必要条件,本文就普适计算对智能校园建设进行了全方面的分析研究. 相似文献
15.
Pervasive computing,which requires applications composed of independent and distributed components,is an important domain for dynamic ubiquitous heterogeneous environment.However,one of the critical challenges it faces is resource allocation.To overcome the difficulty,enhanced universal service terminal(UST+) is designed as a reflective middleware combined distributed components with particular features to achieve user goals.Moreover,a novel algorithm based on microeconomics is presented to resolve conflict... 相似文献
16.
17.
《现代电子技术》2016,(18)
对云计算平台下的人脸识别方法进行研究,在Hadoop平台上建立基于支持向量机分类模型的人脸识别方法,以发挥Map Reduce并行计算优势,提高识别效率。由于常规LBP算子和深度LBP算子识别人脸特征不同,所以该文使用加权方式结合两种算子,以发挥各自的优点。最后,使用人脸识别领域应用最为广泛的Yale B人脸数据库、ORL人脸数据库以及FERET人脸数据库对该文研究的云计算平台下的人脸识别算法进行实例分析。实验结果表明,所研究的识别方法的识别准确率要高于使用传统方法的识别率。在相同云计算平台下,使用BP神经网络和RBF神经网络建立分类器与该文研究的人脸识别方法进行对比,结果表明,在云计算平台下,使用SVM分类器进行人脸识别的效果优于BP神经网络和RBF神经网络分类器。 相似文献
18.
19.
《现代电子技术》2016,(18):52-56
云计算大规模服务器涉及的资源非常丰富,数据量巨大,对其中的故障进行诊断需要大量的科学计算,当前的故障诊断平台通过对故障信息特征的提取实现对服务器故障的诊断,效率极低。因此,设计一种新的云计算大规模服务器故障诊断平台,给出平台的总体结构,详细分析了主控芯片、电源电路、复位电路、无线通信模块和故障诊断模块,共同实现云计算大规模服务器的故障诊断。软件设计中,介绍了故障诊断平台的诊断流程,给出了详细实现过程的代码。用户通过系统的身份验证后,通过平台对服务器进行故障诊断,直至故障排除为止。实验结果表明,采用所设计平台对云计算大规模服务器故障进行诊断,不仅诊断成功率高,而且所需时间较短。 相似文献
20.