2010
DOI: 10.1016/j.camwa.2010.01.009
|View full text |Cite
|
Sign up to set email alerts
|

Security middleware approaches and issues for ubiquitous applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…For having a secure system we must consider confidentially, integrity and availability. Therefore, middleware should provide different security measures for ubiquitous applications and pervasive environment such as authentication where identification and credentials, authorized modifications and access control policy are needed for verification and managements in accountability [21]. Privacy means all IoT system components that access personal user information must guarantee protection of mentioned information from unauthorized access.…”
Section: K Security and Privacymentioning
confidence: 99%
“…For having a secure system we must consider confidentially, integrity and availability. Therefore, middleware should provide different security measures for ubiquitous applications and pervasive environment such as authentication where identification and credentials, authorized modifications and access control policy are needed for verification and managements in accountability [21]. Privacy means all IoT system components that access personal user information must guarantee protection of mentioned information from unauthorized access.…”
Section: K Security and Privacymentioning
confidence: 99%
“…However, very limited research and development efforts were conducted in this regard. Meantime, a number of security middleware solutions were developed for other types of distributed systems such as ubiquitous applications [17]. These solutions provide a useful base for developing and operating ubiquitous applications.…”
Section: Advanced Services Middleware For Cpsmentioning
confidence: 99%
“…Zhang et al (2010) present an approach to combine the power of BDI practical reasoning and OWL/ SWRL ontologies theoretical reasoning in order to improve the intelligence of pervasive middleware, supported by a set of SelfManagement Pervasive Service (SeMaPS) ontologies featuring dynamic context, complex context and self-management rules modelling. AI-Jaroodi et al (2010) review some representative security middleware approaches and highlight their various properties, characteristics and challenges.…”
Section: Technology Infrastructure Layermentioning
confidence: 99%