EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
Computer
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI
Agent Computing and Multi-Agent Systems
Intelligent pervasive network authentication: S/key based device authentication
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A hybrid multi-application authentication and authorization model using Multi-Agent System and PKI
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Intelligent home network authentication: home device authentication using device certification
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Intelligent home network authentication: S/key-based home device authentication
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Hi-index | 0.00 |
The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) and user ownself space (SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.