On the impact of quality of protection in wireless local area networks with IP mobility
Mobile Networks and Applications
Towards a Universal Friendly P2P Media Streaming Application: An Evaluation Framework
PCM '08 Proceedings of the 9th Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Quality of protection analysis and performance modeling in IP multimedia subsystem
Computer Communications
Evaluation of quality of protection adding HVM in wireless network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Adaptable authentication model: exploring security with weaker attacker models
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Optimization of TLS security protocol using the adaptable security model
Annales UMCS, Informatica
Optimization of TLS security protocol using the adaptable security model
Annales UMCS, Informatica
Buffer occupancy feedback security control and changing encryption keys to protect MOD services
PSIVT'06 Proceedings of the First Pacific Rim conference on Advances in Image and Video Technology
Hi-index | 0.00 |
In traditional computer systems, security is typically provided in a one-or-nothing manner; the system is either secure or insecure. Such an approach is insufficient for pervasive environments that contain heterogenous devices with varying computing resources. The small, portable handheld devices are often left unsecured due to their limited computing power. The approach is also inadequate for multimedia applications that require security as a controllable service attribute to maintain performance quality of service to levels that are acceptable to the users. Hence, we need a tunable and differentiable security framework. In this paper, we present a quality of protection (QoP) framework that resolves the inadequacies of the one-or-nothing approach by providing differential security levels for different device, user and application security requirements and preferences. We show that our QoP framework is necessary for multimedia applications to achieve the best possible security and performance levels in pervasive environments.