Proceedings of the 5th ACM international workshop on Mobility management and wireless access
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
A multimodal technique for an embedded fingerprint recognizer in mobile payment systems
Mobile Information Systems - Advances in Mobile Communications and Computing
Hi-index | 0.00 |
In a pervasive computing environment, users have many devicesthat are used to initiate or answer remote service requests,such as obtaining real-time stock quotes, handlingcorporate e-mail, or accepting telephone calls. We envisionthat in the future, many applications will be distributed, runningacross many of a user's specialized pervasive devicesrather than on a single system. In this case, a user needs theability to "log into" the personal pervasive domain whichspans each of the pervasive devices representing this user.In addition, the pervasive devices belonging to the user'spervasive domain must be able to represent this user to externalservices. We solve the problem of managing the authorizationfor pervasive devices belonging to a user's personalpervasive domain by introducing a central personalauthorization gateway that accompanies the user and allowspervasive devices in the user's pervasive domain to beautomatically configured and authorized.