Research on use of distributed authentication in pervasive computing

被引:0
|
作者
Liu, Hui [1 ]
Zhang, Cai-Ming [1 ]
机构
[1] Shandong Econ Univ, Dept Comp Sci & Tech, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SPCA.2006.297485
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a new idea of applying distributed authentication mechanism to pervasive computing by analyzing the security hidden troubles, especially the problems such as mutual trust of entities and the secrecy of user's privacy information in pervasive computing. At last, the detail illustration about trust pervasive model that distributes the trust among a set of hosts supporting distributed applications is given.
引用
收藏
页码:571 / +
页数:2
相关论文
共 50 条
  • [21] Distributed Authentication in the Cloud Computing Environment
    Liu, Yanzhu
    Li, Zhi
    Sun, Yuxia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 810 - 818
  • [22] Secure password authentication for distributed computing
    Jung, Seung Wook
    Jung, Souhwan
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1345 - 1350
  • [23] Secure password authentication for distributed computing
    Jung, Scung Wook
    Jung, Souhwan
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 491 - 501
  • [24] An authentication scheme for distributed computing environment
    Jan S.U.
    Qayum F.
    Jan, Saeed Ullah (saeedullah@uom.edu.pk), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (13): : 227 - 248
  • [25] The master key: A private authentication approach for pervasive computing environments
    Zhu, Feng
    Mutka, Matt W.
    Ni, Lionel M.
    PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 212 - +
  • [26] An inter-domain authentication scheme for pervasive computing environment
    Yao, Lin
    Wang, Lei
    Kong, Xiangwei
    Wu, Guowei
    Xia, Feng
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) : 234 - 244
  • [27] Authentication for Ubiquitous multi domain in pervasive computing using PMI
    Lee, Deok Gyu
    Moon, Jong Sik
    Park, Jong Hyuk
    Lee, Im Yeong
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 515 - 524
  • [28] A visual way to talk to strangers: authentication in wireless pervasive computing
    Shin, Dongwan
    Claycomb, William
    Im, Seunghyun
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2010, 5 (04) : 252 - 260
  • [29] Research on Pervasive Simulation Based on Grid and Pervasive Computing Technology
    Li, Ni
    Xiao, Zhen
    Xu, Lijuan
    Peng, Xiaoyuan
    7TH INTERNATIONAL CONFERENCE ON SYSTEM SIMULATION AND SCIENTIFIC COMPUTING ASIA SIMULATION CONFERENCE 2008, VOLS 1-3, 2008, : 211 - 217
  • [30] Visualizing the research on pervasive and ubiquitous computing
    Zhao, Rongying
    Wang, Ju
    SCIENTOMETRICS, 2011, 86 (03) : 593 - 612