A Proposed Authentication and Secured Delegation Framework For Users In Nomadic Environment
نویسنده
چکیده
Nomadic environment are characterized by users authentication mechanisms that draws from the various types of authentication. Existing nomadic environments authentication methods does not effectively support the delegation or assignment of tasks outside of the defined environments. This development in the context of what nomadic environments were designed to achieve is a major drawback. Nomadic environments were conceived to enhance productivity in organizations by allowing nomadic users seamless access to resources and services. This study is proposing a multifactor authentication framework that will support the delegation of tasks within and outside of the nomadic environment. This framework will provide support for the enhancement of the needed workflows that promotes efficiencies required in nomadic environments.
منابع مشابه
Context-Aware Identity Delegation
In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure. This means that security of the shared resources is of prime importance. Frequent delegation of tasks among users must be anticipated as most nomadic environments are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not o...
متن کاملEuropean Context-awareness and Trust (eurocat09) 3 Rd Workshop on Combining Context with Trust, Security, and Privacy Program Commitee Trust Management in Context-aware and Service-oriented Architectures (invited Talk) Context-aware Identity Delegation
In emerging ubiquitous computing, related nomadic users often perform similar tasks and share the same computing infrastructure. This means that security of the shared resources is of prime importance. Frequent delegation of tasks among users must be anticipated as most nomadic environments are hectic and very dynamic. A delegation mechanism with a slightly complicated user interface will not o...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملSecured Framework for Pervasive Healthcare Monitoring Systems
‘Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing applications aimed at providing healthcare services to all the people through mobile communication devices. Pervasive computing devices are resource constrained devices such as battery power, memory, processing power and bandwidth. In pervasive environment data privacy is a key issue. In this application...
متن کامل