Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Improving Security for Ubiquitous Campus Applications
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
SESAME: Scalable, Environment Sensitive Access Management Engine
Cluster Computing
A zero-stop authentication system for sensor-based embedded real-time applications
Journal of Embedded Computing - Real-Time and Embedded Computing Systems
An Efficient Device Authentication Protocol Using Bioinformatic
Computational Intelligence and Security
Intelligent pervasive network authentication: S/key based device authentication
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Active authentication for pervasive computing environments
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Intelligent home network authentication: home device authentication using device certification
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Authentication for ubiquitous multi domain in pervasive computing using PMI
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Pseudonymous PKI for ubiquitous computing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Confidence value based multi levels of authentication for ubiquitous computing environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Authentication for single/multi domain in ubiquitous computing using attribute certification
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Intelligent home network authentication: S/key-based home device authentication
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
International Journal of Advanced Pervasive and Ubiquitous Computing
Hi-index | 0.00 |
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users and computing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access control techniques and privacy preserving protocols.We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.