Novel Security Model for Pervasive Systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Novel Security Model for Pervasive Systems

As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People might engage in many computational devices simultaneously without even the awareness of their existence. The idea of pervasive computing is that almost every device we see today will be capable of communication and function in collaboration with one...

متن کامل

Security Issues for Pervasive Personalized Communication Systems

Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal profile for enabling communication to persons whose mobile phones represent similar profiles. However, this raises very specific security issues, in particular relating to the use of Bluetooth technology. Herein we con...

متن کامل

Pervasive Differentiated Services: A QoS Model for Pervasive Systems

In this article, we introduce a mechanism by which the same concept of differentiated services used in network transmission can be applied to provide quality of service levels to pervasive systems applications. The classical DiffServ model, including marking and classification, assured forwarding, and expedited forwarding, are all utilized to create quality of service guarantees for various per...

متن کامل

A simple security model for emerging 802.11 pervasive environments

One of the most critical issues for pervasive environment is security. This paper proposes to adapt the security architecture (IEEE 802.1x) that is going to be deployed in emerging wireless networks. In particular we suggest working with dedicated smartcards, recently described in an internet draft [6], and processing the Extensible Authentication Protocol [10].

متن کامل

Security Solutions for Pervasive Healthcare

Pervasive healthcare systems use pervasive computing technologies, e.g., wearable medical sensors with wireless interconnects, to increase the modalities and spatiotemporal dimensions in which healthcare services can be provided for improving patient outcomes. Security is very important in pervasive healthcare systems to protect sensitive health information that it collects and manages; therefo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/10441-5127