Research on use of distributed authentication in pervasive computing

被引:0
|
作者
Liu, Hui [1 ]
Zhang, Cai-Ming [1 ]
机构
[1] Shandong Econ Univ, Dept Comp Sci & Tech, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SPCA.2006.297485
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a new idea of applying distributed authentication mechanism to pervasive computing by analyzing the security hidden troubles, especially the problems such as mutual trust of entities and the secrecy of user's privacy information in pervasive computing. At last, the detail illustration about trust pervasive model that distributes the trust among a set of hosts supporting distributed applications is given.
引用
收藏
页码:571 / +
页数:2
相关论文
共 50 条
  • [1] Authentication for pervasive computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 116 - 129
  • [2] Fair authentication in pervasive computing
    Li, Jun
    Christianson, Bruce
    Loomes, Martin
    SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 132 - 143
  • [3] An authentication protocol for pervasive computing
    Li, SQ
    Zhou, JY
    Li, XX
    Chen, KF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2005, 3758 : 553 - 563
  • [4] Hierarchical trustworthy authentication for pervasive computing
    Xiao, Hannan
    Malcolm, James A.
    Christianson, Bruce
    Zhang, Ying
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 87 - +
  • [5] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (03) : 469 - 481
  • [6] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 186 - 202
  • [7] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [8] Research of Pervasive Computing
    Li Gang
    Chen Anfang
    Yan Junhao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 183 - 185
  • [9] Practical deniable authentication for pervasive computing environments
    Li, Fagen
    Hong, Jiaojiao
    Omala, Anyembe Andrew
    WIRELESS NETWORKS, 2018, 24 (01) : 139 - 149
  • [10] Practical deniable authentication for pervasive computing environments
    Fagen Li
    Jiaojiao Hong
    Anyembe Andrew Omala
    Wireless Networks, 2018, 24 : 139 - 149