A Secure Infrastructure for Service Discovery and Access in Pervasive Computing

نویسندگان

  • Jeffrey Undercoffer
  • Filip Perich
  • Andrej Cedilnik
  • Lalana Kagal
  • Anupam Joshi
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Infrastructure for Service Discovery Access in Pervasive Computing

Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented throu...

متن کامل

SPDP: A Secure Service Discovery Protocol for Ad-hoc Networks

In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised management, and dynamic network topology, among others. Legacy solutions fail...

متن کامل

A trust-based secure service discovery (TSSD) model for pervasive computing

0140-3664/$ see front matter 2008 Elsevier B.V. A doi:10.1016/j.comcom.2008.07.014 * Corresponding author. Tel.: +4142885222. E-mail address: [email protected] (S.I. Aham To cope with the challenges posed by device capacity and capability, and also the nature of ad hoc networks, a Service discovery model is needed that can resolve security and privacy issues with simple solutions. The use of...

متن کامل

Secure Service Discovery based on Trust Management for ad-hoc Networks

In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services dynamically and share them safely, taking into account ad-hoc networks requirements such as limited processing and communication power, decentralised management, and dynamic network topology, among others. Legacy solutions fail...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • MONET

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2003