Study and Implementation of a Solution to Security Management for Mobile Environments Based on Tuple

被引:1
|
作者
Nguessan, Desire [1 ]
Colombo Martini, Jose Sidnei [1 ]
机构
[1] Univ Sao Paulo, POLI USP Polytech Sch, Comp & Digital Syst Engn Dept, BR-05508 Sao Paulo, Brazil
关键词
Mobile middleware; ubiquitous computing; security; confidentiality; authentication;
D O I
10.1109/ICYCS.2008.426
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work exploits the security management and the cooperation of applications in mobile distributed systems. In this context a reflection on different mobile middlewares is made: their capacities to face the challenges of mobility and security issues. The analyses show that the existing middlewares have very few approaches on security problems; security is still a complex issue to be managed in all the levels of a mobile distributed system including new mechanisms. Based on these analyses we propose a security management model that implements a mechanism of authentication, confidentiality and access control of mobile agents in total diffuse environment. The idea is based on interceptor agents and security authorities that distribute security tickets and control the access to resources and Tuple spaces in mobile environment. The proposed model presents good performance and is integrated to an e-health system: Relationship Management with Chronic Patient GRPC [16].
引用
收藏
页码:2014 / 2020
页数:7
相关论文
共 50 条
  • [1] Framework for Security and Privacy Management for Mobile Middleware Based on Tuple
    Nguessan, D.
    Martini, J. S. C.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (08) : 2757 - 2762
  • [2] Study of the Security in Network Management Based on Mobile Agents
    CHEN Zhi~1 WANG Ru-chuan~(1
    2.State Key Laboratory for Novel Software Technology
    [J]. The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 37 - 42
  • [3] Security architecture for service-based mobile environments
    Kopp, H
    Lucke, U
    Tavangarian, D
    [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 199 - 203
  • [4] Security in mobile computing environments
    Veijalainen, J
    Visa, A
    [J]. MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02): : 111 - 112
  • [5] Study of duplicate tuple management
    Kvet, Michal
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2021, : 3081 - 3088
  • [6] Security auditing approach based on mobile agent in grid environments
    Xiao, Zhenghong
    Huang, Changqin
    Xu, Fuyin
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 243 - 250
  • [7] Evaluating Scalability and Performance of a Security Management Solution in Large Virtualized Environments
    Yang, Lishan
    Cherkasova, Ludmila
    Badgujar, Rajeev
    Blancaflor, Jack
    Konde, Rahul
    Mills, Jason
    Smirni, Evgenia
    [J]. PROCEEDINGS OF THE 2018 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE '18), 2018, : 168 - 175
  • [8] A New Tuple Space Structure for Tuple Space based Mobile Middleware Platforms
    De, Suddhasil
    Goswami, Diganta
    Nandi, Sukumar
    [J]. 2012 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2012, : 705 - 710
  • [9] Design and Implementation of Mobile Commerce Security System Based on SMS
    Li, Yan
    Bai, Lan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE (LEMCS 2015), 2015, 117 : 1155 - 1158
  • [10] SECURITY FRAMEWORK FOR MOBILE LEARNING ENVIRONMENTS
    Shonola, Shaibu Adekunle
    Joy, Mike
    [J]. ICERI2014: 7TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2014, : 3333 - 3342