2013
DOI: 10.5120/10441-5127
|View full text |Cite
|
Sign up to set email alerts
|

Novel Security Model for Pervasive Systems

Abstract: As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People might engage in many computational devices simultaneously without even the awareness of their existence. The idea of pervasive computing is that almost every device we see today will be capable of communication and function in collaboration with one another in the near future. Due to lack of a fixed infrastructure for authentication and authorization, devices in pe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…Although technology offers many different solutions to support the communication and the interaction at component level, it still lacks an effective support at system level, where the overall functionalities of the system have to be designed and then developed in terms of coordination of socio-technical components and global adaptation policies. Similarly, pervasive applications accumulate information from multiple parties and sources, raising critical issues as concerns people's privacy and personal (possibly sensitive) data, which cannot be addressed by existing models and techniques [22], [23].…”
Section: The Challengesmentioning
confidence: 99%
“…Although technology offers many different solutions to support the communication and the interaction at component level, it still lacks an effective support at system level, where the overall functionalities of the system have to be designed and then developed in terms of coordination of socio-technical components and global adaptation policies. Similarly, pervasive applications accumulate information from multiple parties and sources, raising critical issues as concerns people's privacy and personal (possibly sensitive) data, which cannot be addressed by existing models and techniques [22], [23].…”
Section: The Challengesmentioning
confidence: 99%