2013
DOI: 10.4018/ijaci.2013070104
|View full text |Cite
|
Sign up to set email alerts
|

Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance

Abstract: Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 16 publications
(15 reference statements)
0
1
0
Order By: Relevance
“…However, even if the configuration of the wireless packet sizes can be intelligently managed [13] such schemes lack protection of content, for which the proposal herein could be a solution. Added to that distributed management of such streaming and its protection might become advantageous, allowing lightweight encryption protection of the streamed video, with the degree of protection according to local device capability arranged intelligently [14]. Thus, encryption stands in the way of unlawful or illicit access to a video server's content and also shields the video stream during transmission over the Internet.…”
Section: Introductionmentioning
confidence: 99%
“…However, even if the configuration of the wireless packet sizes can be intelligently managed [13] such schemes lack protection of content, for which the proposal herein could be a solution. Added to that distributed management of such streaming and its protection might become advantageous, allowing lightweight encryption protection of the streamed video, with the degree of protection according to local device capability arranged intelligently [14]. Thus, encryption stands in the way of unlawful or illicit access to a video server's content and also shields the video stream during transmission over the Internet.…”
Section: Introductionmentioning
confidence: 99%