Design principles for intelligent environments
AAAI '98/IAAI '98 Proceedings of the fifteenth national/tenth conference on Artificial intelligence/Innovative applications of artificial intelligence
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
After Desktop Computing: A Progress Report on Smart Environments Research
IEEE Intelligent Systems
Distributed Authentication in Kerberos Using Public Key Cryptography
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Security Architecture in Gaia
An intelligent authentication infrastructure for ubiquitous computing environments
An intelligent authentication infrastructure for ubiquitous computing environments
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Hi-index | 0.00 |
Nowadays the concept of "pervasive computing" is fully deployed in smart environments to bring more comfort and to allow an easy access to services for users. Due to this fact it is essential to reconsider some security service delivery in smart environments. The authentication service is tightly related to the user and must imperatively take into account his capacities, his preferences and his environment, to be efficient for dependent people. In this paper we propose a new architecture able to provide an intelligent authentication based on modelisation parameters of both the environment and the user profile which are used to build an authentication strategy.