[PDF][PDF] A dynamic trust-based context-aware authentication framework with privacy preserving

P Abi-Char, M Mokhtari, A Mhamed… - Int J Comput Sci Netw …, 2010 - researchgate.net
As ubiquitous technologies ingrain themselves further into our lives, rapid progress has
been made in contextaware computing. Context-aware environments are set to become a …

[引用][C] Security in Pervasive Environments, What's Next?

GK Mostéfaoui - Security and management, 2003

Edge-centric context sharing architecture for the internet of things: context interoperability and context-aware security

É Matos - 2020 - meriva.pucrs.br
The adoption of the Internet of Things (IoT) in smart environments demands ad vances to
cope with the large heterogeneity of IoT entities (ie, systems, applications, and devices) …

[HTML][HTML] Blockchain-based context-aware authorization management as a service in iot

T Sylla, L Mendiboure, MA Chalouf, F Krief - Sensors, 2021 - mdpi.com
Internet of Things (IoT) applications bring evolved and intelligent services that can help
improve users' daily lives. These applications include home automation, health care, and …

Context awareness for adaptive access control management in IoT environments

P Bellavista, R Montanari - Security and Privacy in Cyber …, 2017 - Wiley Online Library
In addition to traditional security challenges, the heterogeneity, dynamicity, and variability/
unpredictability of IoT environments push for innovative and adaptive security solutions. It is …

[PDF][PDF] Review on the security related issues in context aware system

S Almutairi, H Aldabbas… - International Journal of …, 2012 - researchgate.net
ABSTRACT A context aware system is recognized as a “system which uses any context
information previous to, or in the duration of, service stipulations”, whereas the main goal of …

Preserving context security in AWS IoT Core

L Calderoni - Proceedings of the 14th International Conference on …, 2019 - dl.acm.org
Cloud computing platforms are widely used as enabling frameworks for the Internet of
Things. Within this context, a number of peripheral devices are connected to the middleware …

[PDF][PDF] An introduction to context-aware security and User Entity Behavior Analytics

Y Arohan, A Yadav, A Pandey, S Churi… - International Journal of …, 2020 - academia.edu
ABSTRACT A context aware system is recognized as a" system which uses any context
information previous to, or in the duration of, service stipulations", whereas the main goal of …

[HTML][HTML] Adaptive context-aware access control for IoT environments leveraging fog computing

R Kalaria, ASM Kayes, W Rahayu, E Pardede… - International Journal of …, 2024 - Springer
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and
robust access control methods to protect resources from unauthorized access. A cloud …

[PDF][PDF] A Context-aware Adaptive Security Framework for Mobile Applications.

Y Mowafi, I Dhiah el Diehn, T Al-Aqarbeh, M Abilov… - ICCASA, 2014 - researchgate.net
Mobile devices currently offer many value-added applications and services such as
messaging, navigation, social networking, finance, and entertainment. As these mobile …