The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
An architecture for secure wide-area service discovery
Wireless Networks - Selected Papers from Mobicom'99
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Resource Discovery for Pervasive Environments
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Security in mobile communications: challenges and opportunities
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Access-controlled resource discovery for pervasive networks
Proceedings of the 2003 ACM symposium on Applied computing
International Journal of Web and Grid Services
Supporting a service-oriented architecture
Proceedings of the 2008 Spring simulation multiconference
Protecting Global SOA from DoS and Other Security Threats
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Enabling secure service discovery in mobile healthcare enterprise networks
IEEE Wireless Communications - Special issue title on applications and support technical for mobility and enterprise services
International Journal of E-Health and Medical Communications
Hi-index | 0.00 |
This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of this work is twofold. First, to provide protocol architects and software engineers with a map of security requirements in ubiquitous computing, through the evaluation of existing protocols and architectures. Second, to highlight architectural issues, including technologies and trade offs, in the design and implementation of a secure service oriented architecture for ubiquitous computing.