Security in pervasive computing: Current status and open issues

M Haque, SI Ahamed - International Journal of Network …, 2006 - epublications.marquette.edu
Million of wireless device users are ever on the move, becoming more dependent on their
PDAs, smart phones, and other handheld devices. With the advancement of pervasive …

A secure infrastructure for service discovery and access in pervasive computing

J Undercoffer, F Perich, A Cedilnik, L Kagal… - Mobile Networks and …, 2003 - Springer
Security is paramount to the success of pervasive computing environments. The system
presented in this paper provides a communications and security infrastructure that goes far …

A security architecture based on trust management for pervasive computing systems

L Kagal, F Perich, A Joshi, T Finin - Grace Hopper Celebration …, 2002 - ebiquity.umbc.edu
Traditionally, stand-alone computers and small networks rely on user authentication and
access control to provide security. These physical methods use system-based controls to …

Enabling FIPA agents on small devices

G Adorni, F Bergenti, A Poggi, G Rimassa - … Information Agents V: 5th …, 2001 - Springer
The foreseen progress of the market of portable devices is demanding the realisation of
increasingly complex applications for increasingly smaller and ubiquitous devices. This …

[BOG][B] Pervasive systems and ubiquitous computing

A Genco, S Sorce - 2010 - books.google.com
Pervasive systems, due to inexpensive wireless technology can now be implemented easily
and local and network advanced applications can be joined anytime simply by using a …

Information agents for mobile and embedded devices

T Finin, A Joshi, L Kagal, O Ratsimore… - … Information Agents V …, 2001 - Springer
The pervasive computing environments of the near future will involve the interactions,
coordination and cooperation of numerous, casually accessible, and often invisible …

Vigil: Providing trust for enhanced security in pervasive systems

L Kagal, F Perich, A Joshi, Y Yesha, T Finin - 2002 - ebiquity.umbc.edu
Computing today is moving away from the desktop, becoming diffused into our surroundings
and onto our personal digital devices. Moreover, ad-hoc networks such as Bluetooth provide …

[PDF][PDF] Shomar: An open architecture for distributed intrusion detection services

J Undercofer, F Perich, C Nicholas - 2002 - ebiquity.umbc.edu
Distributed Intrusion Detection Systems (DIDS) offer an alternative to centralized intrusion
detection. Current research indicates that a distributed intrusion detection paradigm may …

(Dis) trust certification model for large access in a pervasive environment

R Saadi, JM Pierson, L Brunie - International Journal of Pervasive …, 2005 - emerald.com
The challenge of pervasive computing consists in offering access to computing services
anywhere and anytime with any devices. However, before it becomes a reality, the problems …

[PDF][PDF] A secure infrastructure for service discovery and access in pervasive computing

A Cedilnik, L Kagal, F Perich, A Joshi - 2001 - ebiquity.umbc.edu
Security is paramount to the success of pervasive computing environments. The system
presented in this paper provides a communications and security infrastructure that goes far …