Risk-Based Kerberised Service with JINI in Pervasive Environment
Abstract
Keywords
Full Text:
PDFReferences
Ping Zhang; Jianping Fan; Weimin Zheng “Privacy Protection in Ubiquitous Computing ” published by Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference . pp: 391 – 393 November 2010.
Anthony D.Joseph, UC Berkeley“Security and Privacy in Pervasive Computing” Published by the IEEE Computer Society. pp: 73-75 December 2007
Herzberg, Y. Mass, and J. Michaeli, “Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers,” in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, May 2000
Baomin Xu1, Qiang Gao2 , Xiaoping Yang1 “Extensions to Jini Service Architecture for Pervasive Computing ” 2006 1st International Symposium on Pervasive Computing and Applications, pp. 90-94
Feng Zhu , wei zhu, matt W.Mutka “Private and Secure Service Discovery via Progressive and Probabilistic Exposure” IEEE Transactions on Parallel and Distributed systems, Vol 18. No. 11 Nov 2007. pp. 1565-1577.
Kui Ren, Wenjing Lou, Kwangjo Kim”Novel Privacy Preserving Authentication and Access Control Scheme for Pervasive Computing Environments”, IEEE Transactions on Vehicular technology, Vol.. 55, No. 4, july 2006, pp:1373-1384
Roberto Speicys Cardoso Val´erie Issarny ,“Architecting Pervasive Computing Systems for Privacy: A Survey” in Proceedings of the Working IEEE/IFIP Conference on Software Architecture (WICSA'07). pp: 44-48
Sheikh I. Ahamed, Moushumi Sharmin, and Shameem Ahmed “A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing”, 6th Annual IEEE International conference on pervasive computing and communication. 2008. pp. 590-595.
Swaroop kalasapur “Dynamic Service composition in pervasive Computing”, IEEE transaction on parallel and distributed systems, Vol 18,No.7 july 2007. pp. 907-918.
Tao Sun Mieso.K.Denko,“A Distributed Trust Management Scheme in the Pervasive Computing Environment”, Electrical and Computer Engineering, 2007. CCECE 2007. Canadian Conference on April 2007. pp. 1219-1222.
Tao Sun, Mieso K. Denko “Performance Evaluation of Trust Management in Pervasive Computing” in 22nd International Conference on Advanced Information Networking and Applications. pp: 386-394
T. W. van der Horst et al., “Mobile Trust Negotiation: Authentication and Authorization in Dynamic, Mobile Networks,” in Proceedings of the 8th IFIP Conference on Communications and Multimedia Security, Lake Windermere, England, September 2004.
W. H. Winsborough, K. E. Seamons, and V. E. Jones, “Automated Trust Negotiation,” in Proceedings of the DARPA Information Survivability Conference and Exposition, Hilton Head, South Carolina, January 2000.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.