To see the other types of publications on this topic, follow the link: Ubiquitous Computing Security.

Dissertations / Theses on the topic 'Ubiquitous Computing Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 31 dissertations / theses for your research on the topic 'Ubiquitous Computing Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Stajano, Francesco Mario. "Security for ubiquitous computing." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kilian-Kehr, Roger. "Mobile security with smartcards." Phd thesis, [S.l.] : [s.n.], 2002. http://elib.tu-darmstadt.de/diss/000214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hayat, Mohammed Zia. "Information Security Risk Management for Ubiquitous Computing." Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.484894.

Full text
Abstract:
The potential for rapid and diverse interconnectivity between devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However this has resulted in equally ubiquitous security risks due principally to . the number and complexity of services being run over such networks. As technology advances towards the realisation of a ubiquitous computing environment, what impact does this have on the need to preserve the key information security requirements of: confidentiality: integrity and availability? And how does this influence, future informatio
APA, Harvard, Vancouver, ISO, and other styles
4

Ransom, Stefan. "Managing security and dependability in ubiquitous computing environments." Lübeck Zentrale Hochschulbibliothek Lübeck, 2010. http://d-nb.info/1002133211/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scott, David Jonathan. "Abstracting application-level security policy for ubiquitous computing." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ransom, Stefan [Verfasser]. "Managing security and dependability in ubiquitous computing environments / Stefan Ransom." Lübeck : Zentrale Hochschulbibliothek Lübeck, 2010. http://d-nb.info/1002133211/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Huanjin. "Free roaming: A system for ubiquitous computing." CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.

Full text
Abstract:
Based on the Umbilical Cord system, this project enriches the Ubiquitous Computing system with a Free Roaming system. This Free Roaming consists of a distributed authentication system, a data caching system and a communication system between them. It allows user to roam within this system and access his data everywhere. Together with the Umbilical Cord system, a Ubiquitous Computing system is functionally completed as a prototype, and is ready to be deployed into the Internet.
APA, Harvard, Vancouver, ISO, and other styles
8

Covington, Michael J. "A flexible security architecture for pervasive computing environments." Diss., Available online, Georgia Institute of Technology, 2004:, 2004. http://etd.gatech.edu/theses/available/etd-06072004-131113/unrestricted/covington%5Fmichael%5Fj%5F200405%5Fphd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pérez-Martínez, Pablo Alejandro. "Contributions to privacy protection for ubiquitous computing." Doctoral thesis, Universitat Rovira i Virgili, 2015. http://hdl.handle.net/10803/334398.

Full text
Abstract:
El desenvolupament de noves tecnologies ha introduït el concepte de Computació Ubiqua, a on els objectes que ens envolten poden tenir processadors integrats i establir la comunicació amb altres sistemes, amb la finalitat d'oferir serveis personalitzats per ajudar-nos amb les nostres tasques habituals. No obstant això, a causa de que és possible tenir ordinadors en gairebé qualsevol lloc o objecte, això ha obert noves discussions sobre temes tals com la privadesa i la seguretat, considerats des de diferents punts de vista, com el desenvolupaments jurídics, socials, econòmics i tecnològics, amb
APA, Harvard, Vancouver, ISO, and other styles
10

Kusen, Ema, and Mark Strembeck. "Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing." Department für Informationsverarbeitung und Prozessmanagement, WU Vienna University of Economics and Business, 2014. http://epub.wu.ac.at/4429/1/SLRprotocol.pdf.

Full text
Abstract:
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2013). Objectives: The objective of this systematic review is to identify security-related challenges, security goals and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous
APA, Harvard, Vancouver, ISO, and other styles
11

Chatfield, Craig Andrew. "Privacy and Security in Ubiquitous Computing: Service Delivery and Identity in Intelligent Environments." Thesis, Griffith University, 2010. http://hdl.handle.net/10072/367314.

Full text
Abstract:
Ubiquitous computing describes computing technologies that are designed to be embedded in tools and in our environment, providing computational support for user interaction and service delivery. Intelligent environments are context-aware computing environments that deliver services using ubiquitous computing technologies. These environments provide users with services tailored to the users’ preferences and the current state of the environment. The development and implementation of these environments is challenging due to their potential ability to gather information on the environment’s occupa
APA, Harvard, Vancouver, ISO, and other styles
12

Milagres, Francisco Gomes. "Uso de informações de contexto em segurança computacional." Universidade de São Paulo, 2004. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08112006-141232/.

Full text
Abstract:
Diariamente, novos sistemas ubíquos são desenvolvidos e integrados ao nosso cotidiano, cuja presença às vezes não é percebida pelos seus usuários. O objetivo deste trabalho é investigar as questões de segurança e privacidade existentes nos paradigmas de computação ubíqua e ciente de contexto. Utilizando um protótipo de TV interativa - TV-I (Goularte, 2003) - que possui características de mobilidade e ciência de contexto, este trabalho define um conjunto de requisitos mínimos para a garantia de segurança e privacidade em sistemas ubíquos. É também objetivo deste trabalho utilizar informações co
APA, Harvard, Vancouver, ISO, and other styles
13

Iachello, Giovanni. "Privacy and Proportionality." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10487.

Full text
Abstract:
Over the past several years, the press, trade publications and academic literature have reported with increasing frequency on the social concerns caused by ubiquitous computingInformation Technology (IT) embedded in artifacts, infrastructure and environments of daily life. Designers and researchers of ubiquitous computing (ubicomp) technologies have spent considerable efforts to address these concerns, which include privacy and data protection issues, information security and personal safety. Yet, designing successful ubicomp applications is still an unreliable and expensive endeavor, in part
APA, Harvard, Vancouver, ISO, and other styles
14

Das, Sauvik. "Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/982.

Full text
Abstract:
Despite substantial effort made by the usable security community at facilitating the use of recommended security systems and behaviors, much security advice is ignored and many security systems are underutilized. I argue that this disconnect can partially be explained by the fact that security behaviors have myriad unaccounted for social consequences. For example, by using two-factor authentication, one might be perceived as “paranoid”. By encrypting an e-mail correspondence, one might be perceived as having something to hide. Yet, to date, little theoretical work in usable security has applie
APA, Harvard, Vancouver, ISO, and other styles
15

Vasanta, Harikrishna. "Secure, privacy assured mechanisms for heterogeneous contextual environments." Thesis, Queensland University of Technology, 2006. https://eprints.qut.edu.au/16177/1/Harikrishna_Vasanta_Thesis.pdf.

Full text
Abstract:
Location information is used to provide a diverse range of services to users such as emergency, navigation, billing, security, information and advertising services. This information is derived from a broad range of indoor and outdoor technologies. The location information thus derived is of different granularity, different co-ordination system and is controlled by numerous service providers. In addition to this, broad selections of devices are used for providing these services. Having a diverse range of applications requiring location information at different levels of granularity, the need
APA, Harvard, Vancouver, ISO, and other styles
16

Vasanta, Harikrishna. "Secure, privacy assured mechanisms for heterogeneous contextual environments." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16177/.

Full text
Abstract:
Location information is used to provide a diverse range of services to users such as emergency, navigation, billing, security, information and advertising services. This information is derived from a broad range of indoor and outdoor technologies. The location information thus derived is of different granularity, different co-ordination system and is controlled by numerous service providers. In addition to this, broad selections of devices are used for providing these services. Having a diverse range of applications requiring location information at different levels of granularity, the need to
APA, Harvard, Vancouver, ISO, and other styles
17

Leemaqz, Kaleb Lee. "Privacy of RFID - models and protocols." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/60900/1/Kaleb_Leemaqz_Thesis.pdf.

Full text
Abstract:
Radio Frequency Identification is a wireless identification method that utilizes the reception of electromagnetic radio waves. This research has proposed a novel model to allow for an in-depth security analysis of current protocols and developed new flexible protocols that can be adapted to offer either stronger security or better efficiency.
APA, Harvard, Vancouver, ISO, and other styles
18

Paul, Arnab. "Designing Secure and Robust Distribted and Pervasive Systems with Error Correcting Codes." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6848.

Full text
Abstract:
This thesis investigates the role of error-correcting codes in Distributed and Pervasive Computing. The main results are at the intersection of Security and Fault Tolerance for these environments. There are two primary areas that are explored in this thesis. 1. We have investigated protocols for large scale fault tolerant secure distributed storage. The two main concerns here are security and redundancy. In one arm of this research we developed SAFE, a distributed storage system based on a new protocol that offers a two-in-one solution to fault-tolerance and confidentiality. This protocol is
APA, Harvard, Vancouver, ISO, and other styles
19

Leung, Adrian Ho Yin. "Securing mobile ubiquitous services trusted computing." Thesis, Royal Holloway, University of London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.537518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Jakob, Henner. "Vers la sécurisation des systèmes d'informatique ubiquitaire par le design : une approche langage." Thesis, Bordeaux 1, 2011. http://www.theses.fr/2011BOR14269/document.

Full text
Abstract:
Dans de multiples domaines, un nombre grandissant d'applications interagissant avec des entités communicantes apparaissent dans l'environnement pour faciliter les activités quotidiennes~(domotique et télémédecine). Leur impact sur la vie de tous les jours des utilisateurs rend ces applications critiques: leur défaillance peut mettre en danger des personnes et leurs biens. Bien que l'impact de ces défaillances puisse être majeur, la sécurité est souvent considérée comme un problème secondaire dans le processus de développement et est traitée par des approches ad hoc.Cette thèse propose d'intégr
APA, Harvard, Vancouver, ISO, and other styles
21

Rosa, Diórgenes Yuri Leal da. "EXEHDA-SO: uma abordagem ontológica para ciência de situação aplicada ao domínio de segurança da informação." Universidade Federal de Pelotas, 2017. http://repositorio.ufpel.edu.br:8080/handle/prefix/3841.

Full text
Abstract:
Submitted by Aline Batista (alinehb.ufpel@gmail.com) on 2018-04-18T15:04:36Z No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_Diorgenes_Yuri_Leal_da_Rosa.pdf: 3317198 bytes, checksum: ffad37e3b8f5606e8102f983c5628ac8 (MD5)<br>Approved for entry into archive by Aline Batista (alinehb.ufpel@gmail.com) on 2018-04-19T14:43:29Z (GMT) No. of bitstreams: 2 Dissertacao_Diorgenes_Yuri_Leal_da_Rosa.pdf: 3317198 bytes, checksum: ffad37e3b8f5606e8102f983c5628ac8 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)<br>Made
APA, Harvard, Vancouver, ISO, and other styles
22

Killijian, Marc-Olivier. "CONTRIBUTIONS À LA RÉSILIENCE ET AU RESPECT DE LA VIE PRIVÉE DES SYSTÈMES MOBIQUITAIRES." Habilitation à diriger des recherches, Université Paul Sabatier - Toulouse III, 2013. http://tel.archives-ouvertes.fr/tel-00849725.

Full text
Abstract:
Les travaux présentés dans ce mémoire résument l'ensemble de mes activités dans le domaine de la résilience et du respect de la vie privée dans les systèmes ubiquitaires mobiles. Ils s'orientent sur trois axes principaux : l'utilisation de la réfléxivité pour la construction d'architectures sûres, la résilience des systèmes mobiquitaires (architectures, algorithmes et leur évalution), et la geoprivacy. Le premier axe concerne la tolérance aux fautes pour les systèmes distribués, sous un angle architecture et langage. Dans ces travaux, j' ai étudié l'utilisation de la réflexivité à la compilati
APA, Harvard, Vancouver, ISO, and other styles
23

Mtita, Collins. "Lightweight serverless protocols for the internet of things." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0010/document.

Full text
Abstract:
Les avancées technologiques permettent d'intégrer des capteurs et des modules de communication dans les objets du quotidien pour les rendre intelligents et faciliter leur intégration sur l'Internet. L'Internet du futur sera sans nul doute celui des objets connectés. Les objets connectés génèrent, collectent, stockent et partagent des informations entre eux et aussi avec les serveurs d'authentification centralisés. La plupart des informations collectées doivent être protégées pendant le stockage et le transfert. Par le passé, divers protocoles assurant une sécurité robuste basés sur la cryptogr
APA, Harvard, Vancouver, ISO, and other styles
24

Mtita, Collins. "Lightweight serverless protocols for the internet of things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0010.

Full text
Abstract:
Les avancées technologiques permettent d'intégrer des capteurs et des modules de communication dans les objets du quotidien pour les rendre intelligents et faciliter leur intégration sur l'Internet. L'Internet du futur sera sans nul doute celui des objets connectés. Les objets connectés génèrent, collectent, stockent et partagent des informations entre eux et aussi avec les serveurs d'authentification centralisés. La plupart des informations collectées doivent être protégées pendant le stockage et le transfert. Par le passé, divers protocoles assurant une sécurité robuste basés sur la cryptogr
APA, Harvard, Vancouver, ISO, and other styles
25

Giansiracusa, Michelangelo Antonio. "A secure infrastructural strategy for safe autonomous mobile agents." Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16052/1/Michaelangelo_Giansiracusa_Thesis.pdf.

Full text
Abstract:
Portable languages and distributed paradigms have driven a wave of new applications and processing models. One of the most promising, certainly from its early marketing, but disappointing (from its limited uptake)is the mobile agent execution and data processing model. Mobile agents are autonomous programs which can move around a heterogeneous network such as the Internet, crossing through a number of different security domains, and perform some work at each visited destination as partial completion of a mission for their agent user. Despite their promise as a technology and paradigm to
APA, Harvard, Vancouver, ISO, and other styles
26

Giansiracusa, Michelangelo Antonio. "A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16052/.

Full text
Abstract:
Portable languages and distributed paradigms have driven a wave of new applications and processing models. One of the most promising, certainly from its early marketing, but disappointing (from its limited uptake)is the mobile agent execution and data processing model. Mobile agents are autonomous programs which can move around a heterogeneous network such as the Internet, crossing through a number of different security domains, and perform some work at each visited destination as partial completion of a mission for their agent user. Despite their promise as a technology and paradigm to dri
APA, Harvard, Vancouver, ISO, and other styles
27

Kusen, Ema, and Mark Strembeck. "Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing." 2015. http://epub.wu.ac.at/4619/1/SLRprotocolV3.pdf.

Full text
Abstract:
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous comp
APA, Harvard, Vancouver, ISO, and other styles
28

Kusen, Ema, and Mark Strembeck. "Protocol for a Systematic Literature Review on Security-related Research in Ubiquitous Computing." 2016. http://epub.wu.ac.at/4826/1/SLRprotocoV4.1.pdf.

Full text
Abstract:
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous comp
APA, Harvard, Vancouver, ISO, and other styles
29

Kusen, Ema, and Mark Strembeck. "Protocol for a systematic literature review of security-related research in ubiquitous computing (updated version)." 2015. http://epub.wu.ac.at/4518/1/SLRprotocol_2015.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Muthavhine, Khumbelo Difference. "An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect." Diss., 2018. http://hdl.handle.net/10500/25883.

Full text
Abstract:
Ubiquitous computing is already weaving itself around us and it is connecting everything to the network of networks. This interconnection of objects to the internet is new computing paradigm called the Internet of Things (IoT) networks. Many capacity and non-capacity constrained devices, such as sensors are connecting to the Internet. These devices interact with each other through the network and provide a new experience to its users. In order to make full use of this ubiquitous paradigm, security on IoT is important. There are problems with privacy concerns regarding certain algorithms that a
APA, Harvard, Vancouver, ISO, and other styles
31

Wei, Sheng-Tsun, and 魏聲尊. "A study of securely associating devices in ubiquitous computing environments." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/47658434310207123779.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學系所<br>95<br>There are many important problems in ubiquitous computing environment. One of them is how to associate between wireless devices spontaneously to achieve secure communication. These associations can be roughly divided into two types: short-term associations and long term associations. The TAP (touch-mediated association protocol) belongs to the latter. This thesis focuses on TAP scheme and one of its devices, Mediator. One problem of the Mediator is that it can not authenticate the devices belong to legal owners which request to associate with Mediator. This will
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!