Hardware Based Security in Pervasive Computing Environments

سال انتشار: 1390
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 1,827

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CSCCIT01_034

تاریخ نمایه سازی: 8 بهمن 1390

چکیده مقاله:

The purpose of pervasive computing is anywhere and anytime access to information within computing infrastructures. Pervasive computing poses new security challenges while the information is reachable at anywhere and anytime and it may be applied by malicious users. Additionally, in some special environments such as a military domicile exchanged data between devices may contain private information that cannot be shared by all user communities. Several approaches are developed to protect information for pervasive environments against strangers. As Hardware based security solutions in most fields of technology can offer greater assurance, in this paper, we present a hardware based security usage in pervasive computing environments, which provides more security in comparison with software program based encryptions. The model not only make appropriate decisions about nodes access rights, but also provides trustworthiness security for pervasive computing and protects the information from software based attacks. Finally, the security degree of the model is analyzed.

کلیدواژه ها:

نویسندگان

maryam saleh mohammadzad

University of Tabriz, Master Student of Computer Science

leila mohammad khanli

University of Tabriz, Department of Computer Science

ayaz isazadeh

University of Tabriz, Department of Computer Science

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Nalin Subramanian, Chanjun Yang, Wensheng Zhang, "Securing distributed data storage ...
  • Sheikh I. Ahamed, Moushumi Sharmin, "A trust-based Secure service discovery ...
  • Azzedine Boukerche, Yonglin Ren, "A trust-based security System for ubiquitous ...
  • Rabia Riaz, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung ...
  • William Knight, "Looking for a hardwar hero", Information Today, pp. ...
  • F. Zhu, M. Mutka, L. Ni, "Classification of service discovery ...
  • S. Czerwinski, B.Y. Zhao, T. Hodes, A. Joseph, R. Katz, ...
  • JiniTM Technology Core Platform Specification, Sun Microsystems, Version I.2, 2001. ...
  • First CSUT Conference on Computer, Co mmunication, Information Technology November ...
  • F. Zhu, M. Mutka, L. Ni, Splendor: _ secure, private, ...
  • F. Zhu, M. Mutka, L. Ni, PrudentExpo _ : "A ...
  • F. Zhu, M.W. Mutka, L.M. Ni, "A private, secure, and ...
  • F. Almenarez, C. Campo, SPDP: "A Secure service discovery protocol ...
  • F. Almenarez, A. Marin, C. Campo, C. Garcia, PTM: "A ...
  • F. Almenarez, A. Marin, D. Dyaz, J. Sanchez, "Developing a ...
  • N. Shankar, W. Arbaugh, "On trust for ubiquitous computing", Workshop ...
  • B.A. Miller, T. Nixon, C. Tai, M.D. Wood, "Home networking ...
  • A. Tripathi, T. Ahmed, D. Kulkarni, R. Kumar, K. Kashiramk, ...
  • J. Basu, V. Callaghan, "Towards a trust based approach to ...
  • N. Dragoni, F. Massacci, C. Schaefer, T. Walter, E. Vetillard, ...
  • R.K. Nekkanti, C.-W. Lee, "Trust based adaptive on demand ad ...
  • Y. Yuan, Z. Miao, S. Hu, " A pervasive computing ...
  • S.A. Weis, "Security parallels between people and pervasive devices", Proceedings ...
  • Z. Yan, P. Zhang, T. Virtanen, "Trust Evaluation Based Security ...
  • _ _ _ _ _ _ _ of Japan-China Joit ...
  • Dinesh Kallath, "Trust in Trusted Computing - the end of ...
  • Schneier on Security, by Bruce Schneier, Available at http ://www. ...
  • نمایش کامل مراجع