PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
EVEY: enhancing privacy of service discovery in pervasive computing
Proceedings of the 2007 ACM/IFIP/USENIX international conference on Middleware companion
Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
A proxy-based model for service provision in opportunistic networks
Proceedings of the 6th international workshop on Middleware for pervasive and ad-hoc computing
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Ninja: non identity based, privacy preserving authentication for ubiquitous environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Architecture and implementation of a trust model for pervasive applications
Journal of Mobile Multimedia
Enabling secure discovery in a pervasive environment
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Interoperable Semantic and Syntactic Service Discovery for Ambient Computing Environments
International Journal of Ambient Computing and Intelligence
Middleware for pervasive computing: A survey
Pervasive and Mobile Computing
Hi-index | 0.00 |
Service Discovery as an essential elementin pervasive computing environments is widely accepted.Much active research on service discovery has beenconducted, but privacy has been ignored and may besacrificed. While it is essential that legitimate usersshould be able to discover services of which they havecredentials, it is also necessary that services be hiddenfrom illegitimate users. Since service information,service provider's information, service requests, andcredentials to access services via service discoveryprotocols may be sensitive, we may want to keep themprivate. Existing service discovery protocols do notsolve these problems. We present a user-centric model,called PrudentExposure, as the first approach designedfor exposing minimal information privately, securely,and automatically for both service providers and users ofservice discovery protocols. We analyze themathematical properties of our model and formallyverify our security protocol.