Context-based secure resource access in pervasive computing environments

被引:0
|
作者
Tripathi, A [1 ]
Ahmed, T [1 ]
Kulkarni, D [1 ]
Kumar, R [1 ]
Kashiramka, K [1 ]
机构
[1] Univ Minnesota, Dept Comp Sci, Minneapolis, MN 55455 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a system architecture for supporting ubiquitous computing for mobile users across different environments by transparently performing context-based discovery and binding of resources. A ubiquitous computing environment is viewed as a collaboration space among mobile users, system services, and sensors/resources embedded in the physical environment. We present here different policies for binding resources to names in this space. We also present a role based specification model for defining activities.
引用
收藏
页码:159 / 163
页数:5
相关论文
共 50 条
  • [1] A context-based delegation access control model for pervasive computing
    Liscano, Ramiro
    Wang, Kaining
    [J]. 21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 44 - +
  • [2] A context-based and associated access control model in pervasive computing environment
    Li, Ying
    Tong, Weiqin
    Zhi, Xiaoli
    [J]. 2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 143 - 146
  • [3] Using Context Quality Indicators for Improving Context-based Access Control in Pervasive Environments
    Bringel Filho, Jose
    Martin, Herve
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 285 - 290
  • [4] Context-based media adaptation in Pervasive Computing
    Lei, ZJ
    Georganas, ND
    [J]. CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING 2001, VOLS I AND II, CONFERENCE PROCEEDINGS, 2001, : 913 - 918
  • [5] A semantic context-aware access control framework pp for secure collaborations in pervasive computing environments
    Toninelli, Alessandra
    Montanari, Rebecca
    Kagal, Lalana
    Lassila, Ora
    [J]. Semantic Web - ISEC 2006, Proceedings, 2006, 4273 : 473 - 486
  • [6] A context-aware access control model for pervasive computing environments
    Emami, Sareh Sadat
    Amini, Morteza
    Zokaei, Saadan
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 51 - +
  • [7] An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments
    Sharmin, Moushumi
    Ahmed, Shameem
    Ahamed, Sheikh I.
    [J]. PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 258 - +
  • [8] Context-based access control management in ubiquitous environments
    Corradi, A
    Montanari, R
    Tibaldi, D
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 253 - 260
  • [9] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    [J]. International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
  • [10] Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments
    Choi, Jung Hwan
    Kang, Dong Hyun
    Jang, Hyunsu
    Eom, Young Ik
    [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 491 - 498