The official PGP user's guide
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
Design systolic systems: Illustrating of regular algorithms on synchronous array processors
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The Ninja architecture for robust Internet-scale systems and services373423
Computer Networks: The International Journal of Computer and Telecommunications Networking - pervasive computing
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Profile Driven Data Management for Pervasive Environments
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Ambient intelligence and the development of embedded system software
Ambient intelligence
On Data Management in Pervasive Computing Environments
IEEE Transactions on Knowledge and Data Engineering
Using DAML+OIL to classify intrusive behaviours
The Knowledge Engineering Review
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Intelligent Agents Meet the Semantic Web in Smart Spaces
IEEE Internet Computing
Collaborative joins in a pervasive computing environment
The VLDB Journal — The International Journal on Very Large Data Bases
Toward Distributed Service Discovery in Pervasive Computing Environments
IEEE Transactions on Mobile Computing
Service composition for mobile environments
Mobile Networks and Applications
Voluntary cooperation in pervasive computing services
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Web Semantics: Science, Services and Agents on the World Wide Web
A framework for seamless service interworking in ad-hoc networks
Computer Communications
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A semantic web framework for interleaving policy reasoning and external service discovery
RuleML'05 Proceedings of the First international conference on Rules and Rule Markup Languages for the Semantic Web
Hi-index | 0.00 |
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere-anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certificates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad hoc.