Research on use of distributed authentication in pervasive computing

被引:0
|
作者
Liu, Hui [1 ]
Zhang, Cai-Ming [1 ]
机构
[1] Shandong Econ Univ, Dept Comp Sci & Tech, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1109/SPCA.2006.297485
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a new idea of applying distributed authentication mechanism to pervasive computing by analyzing the security hidden troubles, especially the problems such as mutual trust of entities and the secrecy of user's privacy information in pervasive computing. At last, the detail illustration about trust pervasive model that distributes the trust among a set of hosts supporting distributed applications is given.
引用
收藏
页码:571 / +
页数:2
相关论文
共 50 条
  • [31] Some research challenges in pervasive computing
    Robinson, P
    Vogt, H
    Wagealla, W
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 1 - 16
  • [32] Visualizing the research on pervasive and ubiquitous computing
    Rongying Zhao
    Ju Wang
    Scientometrics, 2011, 86 : 593 - 612
  • [33] Research on the Identity Authentication Mechanism of Computing Node in Medical High Performance Distributed Parallel Computing Model
    Hu, Yanmei
    Yang, Mu
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON SENSOR NETWORK AND COMPUTER ENGINEERING, 2016, 68 : 515 - 519
  • [34] Use of ontologies in a pervasive computing environment
    Ranganathan, A
    McGrath, RE
    Campbell, RH
    Mickunas, MD
    KNOWLEDGE ENGINEERING REVIEW, 2003, 18 (03): : 209 - 220
  • [35] Toward distributed service discovery in pervasive computing environments
    Chakraborty, D
    Joshi, A
    Yesha, Y
    Finin, T
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2006, 5 (02) : 97 - 112
  • [36] Distributed context retrieval and consistency control in pervasive computing
    Roussaki, Ioanna
    Strimpakou, Maria
    Pils, Carsten
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (01) : 57 - 74
  • [37] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222
  • [38] Distributed Context Retrieval and Consistency Control in Pervasive Computing
    Ioanna Roussaki
    Maria Strimpakou
    Carsten Pils
    Journal of Network and Systems Management, 2007, 15 : 57 - 74
  • [39] Using a two dimensional colorized barcode solution for authentication in pervasive computing
    Claycomb, William
    Shin, Dongwan
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, 2006, : 173 - +
  • [40] A study on secure RFID mutual authentication scheme in pervasive computing environment
    Kang, Soo-Young
    Lee, Deok-Gyu
    Lee, Im-Yeong
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4248 - 4254