Decidability and expressiveness aspects of logic queries
PODS '87 Proceedings of the sixth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Unified login with pluggable authentication modules (PAM)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Security: for ubiquitous computing
Security: for ubiquitous computing
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
An optimizing prolog front-end to a relational query system
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
A Middleware Infrastructure for Active Spaces
IEEE Pervasive Computing
Computer
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
GaiaOS: An Infrastructure for Active Spaces
GaiaOS: An Infrastructure for Active Spaces
Reflective Middleware: From Your Desk to Your Hand
IEEE Distributed Systems Online
An infrastructure for context-awareness based on first order logic
Personal and Ubiquitous Computing
Gaia Mobility: Extending Active Space Boundaries to Everyday Devices
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Reasoning about Uncertain Contexts in Pervasive Computing Environments
IEEE Pervasive Computing
DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Secure context-sensitive authorization
Pervasive and Mobile Computing
Integrating presence inference into trust management for ubiquitous systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Access control to information in pervasive computing environments
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees
Proceedings of the 12th ACM symposium on Access control models and technologies
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
Usable key agreement in home networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Secure spaces: protecting freedom of information access in public places
ICOST'07 Proceedings of the 5th international conference on Smart homes and health telematics
Context-aware security management system for pervasive computing environment
CONTEXT'07 Proceedings of the 6th international and interdisciplinary conference on Modeling and using context
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
On the consistency of distributed proofs with hidden subtrees
ACM Transactions on Information and System Security (TISSEC)
Access control in personal localized semantic information spaces
ruSMART/NEW2AN'10 Proceedings of the Third conference on Smart Spaces and next generation wired, and 10th international conference on Wireless networking
Randomized algorithm in embedded crypto module
ICONIP'06 Proceedings of the 13th international conference on Neural information processing - Volume Part III
Security in depth through smart space cascades
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Chameleon: a model of identification, authorization and accountability for ubicomp
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
The design of random number generator in an embedded crypto module
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
Scalability in a secure distributed proof system
PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
An adaptive filter mechanism of random number generator in a crypto module
PPAM'05 Proceedings of the 6th international conference on Parallel Processing and Applied Mathematics
Middleware for distributed context-aware systems
OTM'05 Proceedings of the 2005 Confederated international conference on On the Move to Meaningful Internet Systems - Volume >Part I
Distributed processing of context-aware authorization in ubiquitous computing environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Context-aware regulation of context-aware mobile services in pervasive computing environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
The fuzzy engine for random number generator in crypto module
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Design of tree filter algorithm for random number generator in crypto module
ICIAR'05 Proceedings of the Second international conference on Image Analysis and Recognition
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Architecture of context-aware integrated security management systems for smart home environment
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Behavior-based access control for distributed healthcare systems
Journal of Computer Security
Hi-index | 0.00 |
Ubiquitous computing has fueled the idea of constructing sentient, information-rich "smart spaces" that extend the boundaries of traditional computing to encompass physical spaces, embedded devices, sensors, and other machinery. To achieve this, smart spaces need to capture situational information so that they can detect changes in context and adapt themselves accordingly. However, without considering basic security issues ubiquitous computing environments could be rife with vulnerabilities. Ubiquitous computing environments impose new requirements on security. Security services, like authentication and access control, have to be non-intrusive, intelligent, and able to adapt to the rapidly changing contexts of the spaces. We present a ubiquitous security mechanism that integrates context-awareness with automated reasoning to perform authentication and access control in ubiquitous computing environments.