The anatomy of a context-aware application
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
Hi-index | 0.00 |
This paper identifies security issues posed by ubiquitous computing applications used in university campuses, and propose software architectures to address the issues. Applications in ubiquitous computing environment exploit interactions between personal and public devices, and adapt to user's context. Security issues posed by these applications are privacy, usability, and hybrid scheme. Privacy Profile Negotiation Protocol (PPNP) allows users to change the granularity of their personal profile presented to profile-aware services, in order to preserve privacy, and Zero-stop Authentication System (ZSAS) provides real-time automaticauthentication of users to leverage usability of user authentication in the physical space. We also present several applications to outline the usage of these systems.