To see the other types of publications on this topic, follow the link: Ubiquitous Computing Security.

Journal articles on the topic 'Ubiquitous Computing Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ubiquitous Computing Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hayat, Zia, Jeff Reeve, and Chris Boutle. "Ubiquitous security for ubiquitous computing." Information Security Technical Report 12, no. 3 (2007): 172–78. http://dx.doi.org/10.1016/j.istr.2007.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Priti, and Nidhi Goel. "Security Issues in Ubiquitous Computing: A Literature Review." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 17. http://dx.doi.org/10.23956/ijarcsse.v7i8.10.

Full text
Abstract:
Ubiquitous computing is a concept where computing is made to appear everywhere using any device, in an in any location and in any format. In this paper we have discussed the properties and applications of Ubiquitous Computing. We have also discussed some of the security challenges for Ubiquitous Computing and various security attacks on Ubiquitous Computing Networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Wen Gang, Xiao Jie Song, and Wei Liu. "Research of Information Security Framework in Ubiquitous Environment." Advanced Materials Research 433-440 (January 2012): 1397–99. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.1397.

Full text
Abstract:
Ubiquitous Computing has been viewed as the promising computing mode and noticed universally. The security problem gets more important. This article first gives the features of the ubiquitous environment and then analyzes the information security requirements in ubiquitous environment and finally designs the security framework for ubiquitous environment.
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, M. Fahim Ferdous, and Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.

Full text
Abstract:
Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters – which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of con
APA, Harvard, Vancouver, ISO, and other styles
5

Joshi, Anupam, Tim Finin, Lalana Kagal, Jim Parker, and Anand Patwardhan. "Security policies and trust in ubiquitous computing." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (2008): 3769–80. http://dx.doi.org/10.1098/rsta.2008.0142.

Full text
Abstract:
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protect
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Jongsung, Jiqiang Lu, and Ching-Hsien Hsu. "Advanced security technologies and applications for ubiquitous computing." Personal and Ubiquitous Computing 17, no. 5 (2012): 835–36. http://dx.doi.org/10.1007/s00779-012-0533-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Weippl, E., A. Holzinger, and A. M. Tjoa. "Security aspects of ubiquitous computing in health care." e & i Elektrotechnik und Informationstechnik 123, no. 4 (2006): 156–61. http://dx.doi.org/10.1007/s00502-006-0336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stajano, F., and R. Anderson. "The Resurrecting Duckling: security issues for ubiquitous computing." Computer 35, no. 4 (2002): supl22—supl26. http://dx.doi.org/10.1109/mc.2002.1012427.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sandhu, Reema. "SHIFTING PARADIGM FROM MOBILE COMPUTING TO UBIQUITOUS/PERVASIVE COMPUTING." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 11 (2013): 360–63. https://doi.org/10.5281/zenodo.14613505.

Full text
Abstract:
Pervasive computing aims to make our lives simpler through the use of tools that allow us to manage information easily. These "tools" are a new class of intelligent, portable devices that allow the user to plug into powerful networks and gain direct, simple, and secure access to both relevant information and services. Pervasive computing devices are not personal computers as we tend to think of them, but very tiny - even invisible. The aim of this research paper has been to throw light on how the future of human beings will be governed in the light of Ubiquitous/Pervasive Computing. The differ
APA, Harvard, Vancouver, ISO, and other styles
10

Ema, Arisa, and Yuko Fujigaki. "How far can child surveillance go?: Assessing the parental perceptions of an RFID child monitoring system in Japan." Surveillance & Society 9, no. 1/2 (2011): 132–48. http://dx.doi.org/10.24908/ss.v9i1/2.4105.

Full text
Abstract:
There have recently been increasing numbers of studies on ubiquitous computing to build pervasive communication infrastructures. In Japan, a national strategy to become a ubiquitous network society in which anyone can easily access and use a network any time, anywhere and from any appliance, has been promoted for the sake of social security. A child monitoring system using radio frequency identification (RFID) is one example of a security system accepted by Japanese parents since 2004; the system informs parents of the exact time their child enters and leaves the school gate. Along with the te
APA, Harvard, Vancouver, ISO, and other styles
11

Lee, Jae Dong, Hyung Jin Im, Won Min Kang, and Jong Hyuk Park. "Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/683982.

Full text
Abstract:
As intelligent ubiquitous devices become more popular, security threats targeting them are increasing; security is seen as one of the major challenges of the ubiquitous computing. Now a days, applying ubiquitous computing in number of fields for human safety and convenience was immensely increased in recent years. The popularity of the technology is rising day by day, and hence the security is becoming the main focused point with the advent and rising popularity of the applications. In particular, the number of wireless networks based on ubiquitous devices has increased rapidly; these devices
APA, Harvard, Vancouver, ISO, and other styles
12

Jagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.

Full text
Abstract:
The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can b
APA, Harvard, Vancouver, ISO, and other styles
13

YAMADA, S. "Access Control for Security and Privacy in Ubiquitous Computing Environments." IEICE Transactions on Communications E88-B, no. 3 (2005): 846–56. http://dx.doi.org/10.1093/ietcom/e88-b.3.846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Ogiela, Marek R., Aniello Castiglione, and Ilsun You. "Soft computing for security services in smart and ubiquitous environments." Soft Computing 18, no. 9 (2014): 1655–58. http://dx.doi.org/10.1007/s00500-014-1380-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Lee, Seongkee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, and Hoonkyu Kim. "Resiliency of mobile OS security for secure personal ubiquitous computing." Personal and Ubiquitous Computing 22, no. 1 (2017): 23–34. http://dx.doi.org/10.1007/s00779-017-1098-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Osborn, Emma, and Andrew Simpson. "On Safety and Security Requirements in Emerging Ubiquitous Computing Models." Computer Journal 59, no. 4 (2015): 570–91. http://dx.doi.org/10.1093/comjnl/bxv085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hoang, Nguyen Van. "Multi-Access Edge Computing Architecture and Smart Agriculture Application in Ubiquitous Power Internet of Things." International Journal of Mobile Network Communications & Telematics 13, no. 4 (2023): 01–19. http://dx.doi.org/10.5121/ijmnct.2023.13401.

Full text
Abstract:
The Ubiquitous Power Internet of Things (UPIoT) is a deep integration of the interconnected power network and communication network, enabling full perception of the system status and business operations for power production, transmission, and consumption. To address the challenges of real-time perception, rapid response, and privacy protection, UPIoT can benefit from the use of edge computing technology. Edge computing is a new and innovative computing architecture that enables quick and efficient processing of data close to the source, bypassing network latency and bandwidth issues. By shifti
APA, Harvard, Vancouver, ISO, and other styles
18

Ma, Tinghuai, Sen Yan, Jin Wang, and Sungyoung Lee. "Privacy preserving in ubiquitous computing: Classification & hierarchy." Computer Science and Information Systems 8, no. 4 (2011): 1185–206. http://dx.doi.org/10.2298/csis110315055m.

Full text
Abstract:
In this paper, we adopt the classification of personal information and hierarchy of services to build a privacy system, in which one communicates with each other via pipes with different security levels. In each level, one has the corresponding rights to access each other. The requesters are not able to be infringed based on the personal information that service obtains from service providers. Privacy system can decrease the interaction, while in other circumstance the system strengthens and enhances the privacy preserving. Thus we strike a balance between two goals of Ubiquitous Computing: in
APA, Harvard, Vancouver, ISO, and other styles
19

Adithya, B., and B. Sathish Babu. "Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 4 (2012): 7–18. http://dx.doi.org/10.4018/japuc.2012100102.

Full text
Abstract:
Ubiquitous computing has been studied extensively as a post desktop model. Secure communication among various heterogeneous networks is been a challenge in service environment with location dynamism of the nodes. In this paper the authors proposed model for trust worthy communications among devices of various networks in a ubiquitous environment with varied service needs, security needs and computational-storage capacities. The model uses a novel approach for computing trust - adaptive to capacity and services.
APA, Harvard, Vancouver, ISO, and other styles
20

Calhau, Flavio, Romildo Bezerra, Flavia Nascimento, and Joberto Martins. "An Autonomic and Ubiquitous Framework for Smart Grid Management." International Journal of Innovative Computing, Information and Control 11, no. 4 (2015): 1369–97. https://doi.org/10.5281/zenodo.3525882.

Full text
Abstract:
Smart grid is a network and telecommunications infrastructure with a set of applications and technical features such as interoperability with legacy systems, two-way communication, and ability to recover from failures, among others. Smart grid architecture is highly based on communications networks with new required and inherent advantages, such as greater efficiency and reliability to the system, allowing communication between intelligent devices in network. Among the challenges for the development of new generation network for smart grids, it is possible to highlight security, monitoring, ma
APA, Harvard, Vancouver, ISO, and other styles
21

You, Ilsun, and Witold Pedrycz. "Editorial: Advanced intelligent and security services in mobile and ubiquitous computing." Journal of Intelligent Manufacturing 23, no. 4 (2010): 1257–58. http://dx.doi.org/10.1007/s10845-010-0408-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Qiu, Meikang, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin, and Laurence T. Yang. "Security-aware optimization for ubiquitous computing systems with SEAT graph approach." Journal of Computer and System Sciences 79, no. 5 (2013): 518–29. http://dx.doi.org/10.1016/j.jcss.2012.11.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Yicheng, Chen, Zou Xuecheng, Liu Zhenglin, Han Yu, and Zheng Zhaoxia. "Energy-efficient and security-optimized AES hardware design for ubiquitous computing." Journal of Systems Engineering and Electronics 19, no. 4 (2008): 652–58. http://dx.doi.org/10.1016/s1004-4132(08)60134-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Boukerche, Azzedine, and Yonglin Ren. "A trust-based security system for ubiquitous and pervasive computing environments." Computer Communications 31, no. 18 (2008): 4343–51. http://dx.doi.org/10.1016/j.comcom.2008.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mhetre, Nalini A., Arvind V. Deshpande, and Parikshit Narendra Mahalle. "Trust Management Model based on Fuzzy Approach for Ubiquitous Computing." International Journal of Ambient Computing and Intelligence 7, no. 2 (2016): 33–46. http://dx.doi.org/10.4018/ijaci.2016070102.

Full text
Abstract:
The current state of ubiquitous computing has been greatly influenced by emerging networking developments like Internet of Things (IoT), Future Internet etc. Adequate trust management is crucial to provide security. The entities involved in communication must be trusted for specific purposes depending on their role. Using trust model, devices can run trust computations and guide their behaviors. To this effect, a method is needed to evaluate the level of trust between devices. Trust models investigated so far discusses that devices face problems when communicating as transforming trust relatio
APA, Harvard, Vancouver, ISO, and other styles
26

Ali, Ali. "Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure." Journal of Intelligent Systems and Internet of Things 12, no. 2 (2024): 75–88. http://dx.doi.org/10.54216/jisiot.120206.

Full text
Abstract:
The seamless integration of technology for computing into everyday items and environments is known as pervasive computing. To protect against cyber threats and vulnerabilities, robust security mechanisms are necessary. Conventional security measures, including gateways and the use of encryption, may not be sufficient to address the unique challenges encountered in ubiquitous computing systems. But these techniques are still vital. In addition to the variety of devices, resource limitations, mobility needs, and the possibility of large-scale distributed attacks, these obstacles also include the
APA, Harvard, Vancouver, ISO, and other styles
27

Sánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.

Full text
Abstract:
IoT devices provide with real-time data to a rich ecosystems of services and applications that will be of uttermost importance for ubiquitous computing. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core netkworks. Designers may opt for microservice architectures and fog computing to address this challenge while offering the required flexibility for the main players of ubiquitous computing: nomadic users. Microservices require strong security support for Fog computing, to rely on nodes in the boundary of the network for secure
APA, Harvard, Vancouver, ISO, and other styles
28

Zhou, Xiao Yan, Zhi Hua Hu, and Jian Kun Shun. "Security Architecture of Digital Library Research in General Knowledge Environment." Applied Mechanics and Materials 198-199 (September 2012): 601–5. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.601.

Full text
Abstract:
Ubiquitous service is a bran-new service idea and model of digital library. It emphasizes that the library should be centered on users, provide services at anytime and anywhere, and be embedded into user's work. The ubiquitous service model of digital library is mainly embodied in the mobile library service, the user environment-embedded service, the “cloud computing” -based service and the global network library service. Combined with the relevant application examples, this paper expatiates on and analyzes the basic types, characteristics and application status of digital library ubiquitous s
APA, Harvard, Vancouver, ISO, and other styles
29

She, Xin Ping, and Jian Ming Xu. "Wireless LAN Security Enhancement through Trusted Computing Technology." Applied Mechanics and Materials 577 (July 2014): 986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.577.986.

Full text
Abstract:
Wireless communication can provide ubiquitous access to the Internet and more convenience than wired communication. Due to the wide open nature of wireless radio, security over a wireless environment is more complicated. From the initial IEEE 802.11 to IEEE 802.11i, more robust security methods have been adopted to eliminate underlying attacks. IEEE 802.11i is based on the assumption that all participants are honest that they will act as they are expected. But usually it is not true. How to recognize a genuine user, how to keep authentication data safely, and how to prevent dishonest supplican
APA, Harvard, Vancouver, ISO, and other styles
30

Shin, Dong Hee. "Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk." International Journal of Mobile Communications 8, no. 2 (2010): 169. http://dx.doi.org/10.1504/ijmc.2010.031446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Bardram, Jakob E. "The trouble with login: on usability and computer security in ubiquitous computing." Personal and Ubiquitous Computing 9, no. 6 (2005): 357–67. http://dx.doi.org/10.1007/s00779-005-0347-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chang, Chin-Chen, Iuon-Chang Lin, and Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.

Full text
Abstract:
Due to the rapid advancement of cryptographic techniques, the smart card has recently become a popular device because it is capable of storing and computing essential information with such properties as tamper resistance. However, many service providers must satisfy the user’s desire to be able to access services anytime and anywhere with the smart card computing devices. Therefore, multipurpose smart cards have become very popular identification tokens. In 2011, Wang et al. proposed an authentication and key agreement scheme for smart card use. Even so, two drawbacks still exist; that is, (1)
APA, Harvard, Vancouver, ISO, and other styles
33

D., S. Shelar, .G. Andhare P, B. Gaikwad S., and A. Thakre P. "A MATHEMATICAL MODEL FOR ACCESS CONTROL THROUGH TRUST MANAGEMENT IN UBIQUITOUS COMPUTING." Stochastic Modeling & Applications Vol. 26 No. 3, January - June, Special Issue 2022 Part - 2 (2022): 1002–9. https://doi.org/10.5281/zenodo.6572635.

Full text
Abstract:
In the ubiquitous computing environment of wireless access control, access is granted on having successful interactions with other devices/nodes/agents. Consequently, the wireless technologies further extend the association between devices to interact with each other with respect to provide access control. For mobile nodes, many times associations are volatile in nature. There is always a risk associated with such interactions when there is no trust amongst them. From a security perspective, there is a requirement for a proper mechanism to build trust so that nodes can interact with each other
APA, Harvard, Vancouver, ISO, and other styles
34

M, Varaprasad Rao1, and Ch Bharta Chryulu N. "SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS." International Journal of Ubiquitous Computing (IJU) 6, no. 2 (2023): 7. https://doi.org/10.5281/zenodo.8233607.

Full text
Abstract:
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors embedded in mobile phones. The information generated by these devices is a big task in collection and storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we made an attempt to propose a new security algorithm for providing security to Pervasive Computing Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS) algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it a
APA, Harvard, Vancouver, ISO, and other styles
35

Abbagalla, Sindhooja, and Srividhya Gavini. "SMART SECURITY SOLUTIONS FOR CLOUD INFRASTRUCTURE USING MACHINE LEARNING." International Journal of Interpreting Enigma Engineers 01, no. 02 (2024): 08–14. http://dx.doi.org/10.62674/ijiee.2024.v1i02.002.

Full text
Abstract:
Cloud computing has become a ubiquitous storage, processing, and data management tool. However, providing strong security measures inside cloud infrastructure remains a primary priority.The purpose of this study is to give an overview of the process of integrating cloud infrastructure with machine learning. The main objective of this work is to leverage machine learning approaches and models for threat identification, anomaly detection, and access control methods in order to protect sensitive data and reduce growing risks in the cloud infrastructure. Ultimately, this research endeavours to enh
APA, Harvard, Vancouver, ISO, and other styles
36

Qian, Xiaojun, and Xiaoping Che. "Security-enhanced Search Engine Design in Internet of Things." JUCS - Journal of Universal Computer Science 18, no. (9) (2012): 1218–35. https://doi.org/10.3217/jucs-018-09-1218.

Full text
Abstract:
This paper elaborates the challenges in searching imposed by the burgeoning fieldof Internet of Things (IoT). Firstly it overviews the evolution of the new field to its predecessors: searching in the mobile computing, ubiquitous computing and information retrieve. Then,it identifies five research thrusts: architecture design, search locality, real-time, scalability and divulging information. It also sketches several presumptive IoT scenarios, and uses them to iden-tify key capabilities missing in today's systems. On top of these challenging issues, we report our undertaking work – a security-e
APA, Harvard, Vancouver, ISO, and other styles
37

Adamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek, and Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments." Foundations of Computing and Decision Sciences 42, no. 4 (2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.

Full text
Abstract:
Abstract In many distributed computing systems, aspects related to security are getting more and more relevant. Security is ubiquitous and could not be treated as a separated problem or a challenge. In our opinion it should be considered in the context of resource management in distributed computing environments like Grids and Clouds, e.g. scheduled computations can be much delayed because of cyber-attacks, inefficient infrastructure or users valuable and sensitive data can be stolen even in the process of correct computation. To prevent such cases there is a need to introduce new evaluation m
APA, Harvard, Vancouver, ISO, and other styles
38

Jain, Arushi, and Vishal Bhatnagar. "Concoction of Ambient Intelligence and Big Data for Better Patient Ministration Services." International Journal of Ambient Computing and Intelligence 8, no. 4 (2017): 19–30. http://dx.doi.org/10.4018/ijaci.2017100102.

Full text
Abstract:
The term Ambient Intelligence (AmI) encompasses other technologies such as ubiquitous communication, pervasive computing and ubiquitous computing. Hospitals can improve their working by monitoring the health of the patients and performing automatic analysis of various and health parameters inside the room. Security mechanisms can also be enhanced by only allowing authorized hospital staff and attendants in the ward. With the advent of Ambient Intelligence and the congenial political environment, the focus is now shifting to providing better healthcare at homes than at traditional medical cente
APA, Harvard, Vancouver, ISO, and other styles
39

Patalbansi, Vikram, and Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.

Full text
Abstract:
The ubiquitous network like Mobile Cloud Computing (MCC) provides a high quality of wireless services depending upon the wireless communication system network security level. And so many researches are carried out by the researcher on security algorithms for wireless communication system constructed in different network reliability. In our proposed thesis paper, on a theoretical basis, we developed the theory of MCC Security Layer Protocol security system in which we used the cryptographic hash function SHA-256 to generate a private key for entities, RC5 encryption, and decryption algorithm, T
APA, Harvard, Vancouver, ISO, and other styles
40

Bouchemal, Nardjes, Ramdane Maamri, and Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance." International Journal of Ambient Computing and Intelligence 5, no. 3 (2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.

Full text
Abstract:
Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information security is bigger in agent-based AmI systems built by gathering distributed informat
APA, Harvard, Vancouver, ISO, and other styles
41

Song, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.

Full text
Abstract:
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important inf
APA, Harvard, Vancouver, ISO, and other styles
42

Zeng, Xianquan. "Research on Information Security Interaction Mode of Mobile Devices Based on Ubiquitous Computing." Open Automation and Control Systems Journal 7, no. 1 (2015): 805–8. http://dx.doi.org/10.2174/1874444301507010805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Park, James, and Wanlei Zhou. "Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing." Entropy 18, no. 9 (2016): 334. http://dx.doi.org/10.3390/e18090334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Guojun, Jianhua Ma, and Laurence T. Yang. "Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications." Information Sciences 522 (June 2020): 317–18. http://dx.doi.org/10.1016/j.ins.2020.02.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Park, Jong Hyuk. "Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications." International Journal of Communication Systems 22, no. 8 (2009): 959–69. http://dx.doi.org/10.1002/dac.1008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Kusen, Ema, and Mark Strembeck. "A decade of security research in ubiquitous computing: results of a systematic literature review." International Journal of Pervasive Computing and Communications 12, no. 2 (2016): 216–59. http://dx.doi.org/10.1108/ijpcc-03-2016-0018.

Full text
Abstract:
Purpose Ever since Mark Weiser coined the term “ubiquitous computing” (ubicomp) in 1988, there has been a general interest in proposing various solutions that would support his vision. However, attacks targeting devices and services of a ubicomp environment have demonstrated not only different privacy issues, but also a risk of endangering user’s life (e.g. by modifying medical sensor readings). Thus, the aim of this paper is to provide a comprehensive overview of security challenges of ubicomp environments and the corresponding countermeasures proposed over the past decade. Design/methodology
APA, Harvard, Vancouver, ISO, and other styles
47

Olaniyi, Oluwaseun Oladeji, Olalekan Jamiu Okunleye, Samuel Oladiipo Olabanji, Christopher Uzoma Asonze, and Samson Abidemi Ajayi. "IoT Security in the Era of Ubiquitous Computing: A Multidisciplinary Approach to Addressing Vulnerabilities and Promoting Resilience." Asian Journal of Research in Computer Science 16, no. 4 (2023): 354–71. http://dx.doi.org/10.9734/ajrcos/2023/v16i4397.

Full text
Abstract:
The Internet of Things (IoT) has rapidly become a pivotal, transformative force, seamlessly integrating billions of physical devices through sophisticated networks of embedded sensors, software, and internet connectivity. This expansive and interconnected ecosystem offers a broad spectrum of applications, significantly benefiting urban infrastructure with innovative solutions, enhancing industrial operations through optimization, and enriching consumer experiences with smart devices for safety and convenience. Despite the numerous benefits, the widespread adoption of IoT technologies has chall
APA, Harvard, Vancouver, ISO, and other styles
48

Sahmim Ep Guerbouj, Syrine, Hamza Gharsellaoui, and Sadok Bouamama. "A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things." International Journal of Service Science, Management, Engineering, and Technology 10, no. 3 (2019): 32–44. http://dx.doi.org/10.4018/ijssmet.2019070103.

Full text
Abstract:
This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing secur
APA, Harvard, Vancouver, ISO, and other styles
49

Palesandro, Alex, Guegan Chirine Ghedira, Marc Lacoste, and Nadia Bennani. "Overcoming Barriers for Ubiquitous User- Centric Healthcare Services." IEEE Cloud Computing 3, no. 6 (2016): 64–74. https://doi.org/10.1109/MCC.2016.131.

Full text
Abstract:
The cloud model is rapidly evolving, with maturing intercloud architectures and progressive integration of sparse, geodistributed resources into large datacenters. The single-provider administrative barrier is also increasingly crossed by applications, allowing new verticals to benefit from the multicloud model. For instance, in home healthcare systems, transparent usage of resources from multiple providers enables "follow-me" scenarios, where healthcare services are accessible anywhere, anytime, with quality-of-service (QoS) guarantees. However, transparency might be at odds with security and
APA, Harvard, Vancouver, ISO, and other styles
50

Abed, Amira Hassan. "The Techniques of authentication in the Context of Cloud Computing." International Journal of Advanced Networking and Applications 16, no. 04 (2025): 6515–22. https://doi.org/10.35444/ijana.2025.16408.

Full text
Abstract:
One solution that helps with straightforward, on-demand access to a pool of reconfigurable computing resources is cloud computing. Cloud Computing is an emerging and ubiquitous trend. It allows users to enjoy the ondemand services, without the burden of data storage and maintenance costs. Users of this type of computing platform are very concerned about security, and they need to find reliable providers of cloud services. Authentication is believed to be a main necessity for assuring secure access to cloud. In this paper we discussed the comprehensive and detailed frameworks constructed to ass
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!