Proceedings of the 5th ACM International Workshop on Mobility Management and Wireless Access 2007
DOI: 10.1145/1298091.1298095
|View full text |Cite
|
Sign up to set email alerts
|

A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments

Abstract: The proliferation of mobile devices and wireless technologies pave the ground to new scenarios that attract the interest of service providers and business operators. However, to let mobile users able to receive the same services independently from the context in which they operate, several open issues need to be solved. One of these issues is related to the current levels of security that often require mobile users to exchange secret credentials with the network operators or an authentication server. This cons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…However, the authentication mechanism is no longer suitable in the pervasive computing model due to the scalability and the flexibility of ubiquitous platforms lead to having several entities, devices or users that are not always known from the perspective of the service provider. The major characteristic feature of pervasive computing is the design and development of reliable services that should be taken into account while initiating the request and granting the services (Ficco et al , 2007). Hence, a more refined access control approach is required to grant access concerning user identity, behavior and context.…”
Section: Introductionmentioning
confidence: 99%
“…However, the authentication mechanism is no longer suitable in the pervasive computing model due to the scalability and the flexibility of ubiquitous platforms lead to having several entities, devices or users that are not always known from the perspective of the service provider. The major characteristic feature of pervasive computing is the design and development of reliable services that should be taken into account while initiating the request and granting the services (Ficco et al , 2007). Hence, a more refined access control approach is required to grant access concerning user identity, behavior and context.…”
Section: Introductionmentioning
confidence: 99%