Using trust for secure collaboration in uncertain environments

V Cahill, E Gray, JM Seigneur… - IEEE pervasive …, 2003 - ieeexplore.ieee.org
Using trust for secure collaboration in uncertain environments Page 1 52 PERVASIVE computing
Published by the IEEE CS and IEEE ComSoc ■ 1536-1268/03/$17.00 © 2003 IEEE DEALING …

A novel privacy preserving authentication and access control scheme for pervasive computing environments

K Ren, W Lou, K Kim, R Deng - IEEE Transactions on Vehicular …, 2006 - ieeexplore.ieee.org
Privacy and security are two important but seemingly contradictory objectives in a pervasive
computing environment (PCE). On one hand, service providers want to authenticate …

[图书][B] Safeguards in a world of ambient intelligence

P Ahonen, P Alahuhta, B Daskala, S Delaitre… - 2008 - Springer
Safeguards in a World of Ambient Intelligence | SpringerLink Skip to main content
Advertisement SpringerLink Log in Menu Find a journal Publish with us Search Cart Book cover …

A context-aware authentication framework for smart homes

Y Ashibani, D Kauling… - 2017 IEEE 30th Canadian …, 2017 - ieeexplore.ieee.org
There has been a recent rapid increase in the number of Internet of Things (IoT) devices,
providing a wide range of services for smart homes such as surveillance cameras, smart …

Evaluation of user authentication methods in the gadget-free world

K Halunen, J Häikiö, V Vallivaara - Pervasive and Mobile Computing, 2017 - Elsevier
In an ideal gadget-free environment the user is interacting with the environment and the
services through only “natural” means. This imposes restrictions on many aspects of the …

Service security and privacy as a socio-technical problem

G Bella, P Curzon, G Lenzini - Journal of computer security, 2015 - content.iospress.com
The security and privacy of the data that users transmit, more or less deliberately, to modern
services is an open problem. It is not solely limited to the actual Internet traversal, a sub …

Trustworthy pervasive computing: The hard security problems

K Ranganathan - … Workshops, 2004. Proceedings of the Second, 2004 - ieeexplore.ieee.org
We examine five security problems that are barriers to mainstream pervasive computing.
These are: device authentication, privacy, trust management, device assurance, recourse …

[PDF][PDF] The attacker in ubiquitous computing environments: Formalising the threat model

A Roscoe, S Creese, M Goldsmith, I Zakiuddin - 2003 - ora.ox.ac.uk
The ubiquitous computing paradigm will involve both the storage of increased amounts of
valuable or sensitive digital data, and an increase in potential interfaces to networks and …

Ninja: Non identity based, privacy preserving authentication for ubiquitous environments

A Leung, CJ Mitchell - … , UbiComp 2007, Innsbruck, Austria, September 16 …, 2007 - Springer
Most of today's authentication schemes involve verifying the identity of a principal in some
way. This process is commonly known as entity authentication. In emerging ubiquitous …

Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability

K Ren, W Lou - Mobile Networks and Applications, 2007 - Springer
In pervasive computing environments (PCEs), privacy and security are two important but
contradictory objectives. Users enjoy services provided in PCEs only after their privacy …