The computer for the 21st century
ACM SIGMOBILE Mobile Computing and Communications Review - Special issue dedicated to Mark Weiser
Authentication: from passwords to public keys
Authentication: from passwords to public keys
Understanding and Using Context
Personal and Ubiquitous Computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
A pseudonymous communications infrastructure for the internet
A pseudonymous communications infrastructure for the internet
PPPJ '03 Proceedings of the 2nd international conference on Principles and practice of programming in Java
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Security in an autonomic computing environment
IBM Systems Journal
Managing Multiple and Dependable Identities
IEEE Internet Computing
The JXTA performance model and evaluation
Future Generation Computer Systems - Special issue: P2P computing and interaction with grids
Privacy Recovery with Disposable Email Addresses
IEEE Security and Privacy
Trust propagation in small worlds
iTrust'03 Proceedings of the 1st international conference on Trust management
Implementation of the SECURE trust engine
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
In ubiquitous/pervasive computing environments, it is envisaged that computing elements--entities--will start interacting in an ad hoc fashion. The peer-to-peer (p2p) paradigm is appealing for such types of interaction especially with JXTA, which supports the development of reusable p2p building blocks, which facilitate implementation on any smart device. However, the inability to rely on a centralised authentication infrastructure, the openness of the environment and the absence of an administrator (it is assumed to be too expensive to have a skilled administrator at hand due to the large number of peers) challenge the use of legacy authentication mechanisms.Supporting spontaneous interactions among previously unknown entities requires dynamic enrolment of strangers and unknown entities. Entity recognition (ER) is a process that is carried out each time an interaction happens between entities in order to dynamically recognise previously met entities.In this paper, we present the Claim Tool Kit (CTK), a Java-based implementation of ER: entities exchange messages, called Claims, and rely on their associated clues to evaluate the level of confidence in recognition.The CTK employs advanced features available with Java, such as JXTA and Java Cryptography and Security Architectures. We show that the CTK needs performance results on these features in order to increase the level of auto-configuration of the CTK. We describe how to obtain performance assessment for some of these new features. Finally, we explain how the CTK can be instrumented to take into account performance assessment. By analysing the evaluation results, the applicability of these advanced Java-based technologies for peer entity recognition is assessed.