User Access of Public Shared Devices in Pervasive Computing Environments

被引:1
|
作者
Jea, David [1 ]
Yap, Ian [1 ]
Srivastava, Mani [1 ]
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90024 USA
关键词
D O I
10.1109/HCMDSS-MDPnP.2007.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To allow for an efficient usage of a device in pervasive computing environments when a user intends to selectively utilize multiple devices within his/her vicinity, reliable and yet convenient authentication is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the issues of establishing sessions to such devices (logging in, maintaining a session, and logging out), and then identifies the common pitfall of access-control contexts. We propose an improved context-aware solution that supports a secure, selective, and identifiable user access of public shared devices with high usability.
引用
收藏
页码:57 / 63
页数:7
相关论文
共 50 条
  • [1] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    [J]. AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [2] End-user Configuration for Pervasive Computing Environments
    Tuttlies, Verena
    Schiele, Gregor
    Becker, Christian
    [J]. CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 487 - 493
  • [3] End-user programming in pervasive computing environments
    Chin, JSY
    Callaghan, V
    Clarke, G
    Hagras, H
    Colley, M
    [J]. PSC '05: Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005, : 187 - 192
  • [4] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    [J]. 2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [5] Pervasive data access in wireless and mobile computing environments
    Lee, Ken C. K.
    Lee, Wang-Chien
    Madria, Sanjay
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (01): : 25 - 44
  • [6] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    [J]. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [7] Ad hoc composition of user tasks in pervasive computing environments
    Ben Mokhtar, S
    Georgantas, N
    Issarny, V
    [J]. SOFTWARE COMPOSITION, 2005, 3628 : 31 - 46
  • [8] Shared ontology for pervasive computing
    Man, JF
    Yang, AM
    Sun, XM
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 64 - 78
  • [9] An approach to automatic customization of user interfaces for mobile devices in pervasive environments
    Martini, Ricardo Giuliani
    Librelotto, Giovani Rubert
    de Azevedo, Renato Preigschadt
    Fiorin, Andre
    Kasper, Jeferson
    Mozzaquatro, Bruno Augusti
    Pereira, Rafael
    [J]. 2012 XXXVIII CONFERENCIA LATINOAMERICANA EN INFORMATICA (CLEI), 2012,
  • [10] A Calculus for Composite Authorities' Policy Derivation in Shared Domains of Pervasive Computing Environments
    Amini, Morteza
    Jalili, Rasool
    [J]. 2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 913 - 920