A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
COMPSAC '03 Proceedings of the 27th Annual International Conference on Computer Software and Applications
Towards an Authentication Middleware to Support Ubiquitous Web Access
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Workshops and Fast Abstracts - Volume 02
Design of a Security Management Middleware in Ubiquitous Computing Environments
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
A Security-Supportive Middleware Architecture for Pervasive Computing
DASC '06 Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing
S-MARKS: A Middleware Secure by Design for the Pervasive Computing Environment
ITNG '07 Proceedings of the International Conference on Information Technology
Middleware for Secure Home Access and Control
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments
ICNC '07 Proceedings of the Third International Conference on Natural Computation - Volume 05
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
A Trust-based Middleware for Providing Security to Ad-Hoc Peer-to-Peer Applications
PERCOM '08 Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications
Computers & Mathematics with Applications
Computers & Mathematics with Applications
U-commerce research: a literature review and classification
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.09 |
Recently, ubiquitous computing and pervasive environments evolved tremendously and became an integral part of many fields and application domains. This is widely attributed to their seamless integration with many everyday components and efficiency in handling business and personal tasks. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications. This is due to the high levels of personal and private data sharing in these systems. In this paper, we review some representative security middleware approaches and highlight their various properties, characteristics, and challenges. The review reveals that several options are available; however, there are still many issues and challenges to be addressed to achieve more efficient security middleware.