Secure and Private Service Discovery in Pervasive Computing Environments

نویسندگان

  • Feng Zhu
  • Wei Zhu
چکیده

Every year, billions of computing devices are built and seamlessly integrated into our surroundings and daily lives. In the near future, we will live in pervasive computing environments. In these environments, devices range from traditional PCs, printers, or servers, to devices that people carry, wear, and to the devices that are embedded into commodities and ambient environments. Smart phones, iPods, smartcards, RFID tags, and various sensors are already ubiquitous. New types of devices are emerging rapidly. It is predicted that within a decade one may interact with thousands of computing devices in pervasive computing environments. Unlike traditional computing environments, pervasive computing poses at least two new challenges: a great number of devices and extremely dynamic computing environments. Unattended devices and service or partial failures may cause network services inaccessible. New networks ABSTRACT

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments

Increasing computational capabilities and decreasing costs of commonly used devices, and the concomitant development of short range, ad-hoc networking technologies, will help realize the pervasive computing paradigm. In this paper, we present the use of semantically rich descriptions for devices to discover, and cooperate with, others in their vicinity. In particular, we describe our ongoing pr...

متن کامل

A Privacy-Aware Service Discovery Middleware for Pervasive Environments

Pervasive environments are composed of devices with particular hardware characteristics, running various software and connected to diverse networks. In such environments, heterogeneous devices must cooperate to offer meaningful services to users, regardless of technological choices such as service discovery and access protocols. Interoperability thus is a critical issue for the success of perva...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Weighted-HR: An Improved Hierarchical Grid Resource Discovery

Grid computing environments include heterogeneous resources shared by a large number of computers to handle the data and process intensive applications. In these environments, the required resources must be accessible for Grid applications on demand, which makes the resource discovery as a critical service. In recent years, various techniques are proposed to index and discover the Grid resource...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJISP

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2009