Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07) 2007
DOI: 10.1109/percomw.2007.80
|View full text |Cite
|
Sign up to set email alerts
|

Middleware for Secure Home Access and Control

Abstract: User adaptive systems in the context of pervasive computing can only unveil their power if based on a generic middleware managing private data and context information in combination with flexible device access and control. However, managing those data poses severe privacy problems both legally and from a trust perspective. Therefore we propose a home automation middleware for secure management of user and context data that gives access to services just for the authorized users and devices. The middleware has b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Schäfer et al introduce an architecture for a secure profile management middleware with several components: security manager, profile manager, device manager and several authenticators [13]. The architecture is based on the OSGi framework.…”
Section: Methodsmentioning
confidence: 99%
“…Schäfer et al introduce an architecture for a secure profile management middleware with several components: security manager, profile manager, device manager and several authenticators [13]. The architecture is based on the OSGi framework.…”
Section: Methodsmentioning
confidence: 99%
“…This idea of proximity-based authentication is novel, but is not general enough to cover all the authentication cases in the UC environment. In the proposed and implemented middleware architecture for smart home access [9], Main et al differentiated the assurance levels of the different authentication methods, and enforced a user's rights to be dependent on the authentication assurance levels. In [10], the problem of trust delegation among multiple portable devices belonged to the same user is investigated and a trust transfer protocol is presented.…”
Section: Related Workmentioning
confidence: 99%
“…A middleware designed for secure home access and control for home automation [10]. It helps broaden the proliferation of ambient technology.…”
Section: E Mshacmentioning
confidence: 99%
“…Consequently, this technology requires gathering huge amount of personal data which raises many concerns from the consumer point of view. Therefore, a Middleware for Secure Home Access and Control [10] protects personal data and access control by only allowing the relevant stakeholders to benefit from the services. This security middleware is based on two main components one is the JCCM (Java Card Certificate Management) which moves part of the semantics of Cryptoki inside a Java Card to handle the certificate management.…”
Section: A Pervasive Computingmentioning
confidence: 99%