Matches in SemOpenAlex for { <https://semopenalex.org/work/W2619377> ?p ?o ?g. }
Showing items 1 to 72 of
72
with 100 items per page.
- W2619377 abstract "Traditionally, security for stand-alone computers and small networks was handled by physical security and by logging into computers and domains. With open networks like the Internet and pervasive environments, issues concerning security and trust become crucial. There is no longer the physical aspect of security due to the distributed nature of the networks and the concept of user authentication to a domain is not possible. Imagine a scenario where a user, with a portable device, walking through a building, switches on the lights in the corridor and lowers the temperature of the room that he/she enters. This is an example of pervasive/ubiquitous environments that will soon be a reality. In these ubiquitous computing environments users expect to access resources and services anytime and anywhere, leading to serious security risks and problems with access control as these resources can now be accessed by almost anyone with a mobile device. Adding security to such open models is extremely difficult with problems at many levels. We can not assume an architecture with a central authority and access control is required for foreign users. The portable hand-held and embedded devices involved have severe limitations in their processing capabilities, memory capacities, software support and bandwidth characteristics. Moreover, there is currently a great deal of heterogeneity in the hardware and software environments and this is likely to continue for the foreseeable future. Finally, in such an open, heterogeneous, distributed environment there is a great likelihood that inconsistent interpretations will be made of the security information in different domains. Existing security infrastructures deal with authentication and access control. These mechanisms are inadequate for the increased flexibility required by distributed networks. We suggest enhancing security by the addition of trust, which is similar to the way security is handled in human societies. A person is trusted if someone we trust, says that the person can be trusted. In terms of distributed computing, a user is allowed to access a service or information, if the user has the access right to do so, or if the user has been delegated the ability by a trusted authority. Trust management can be viewed as developing of security policies, the assignment of credentials to entities, checking if the credentials fulfill the policy and the delegation of trust to third parties [8, 3]. We propose a lightweight solution for trust management that is applicable for the Internet, which we are tailoring for pervasive computing environments." @default.
- W2619377 created "2016-06-24" @default.
- W2619377 creator A5009972149 @default.
- W2619377 creator A5013709154 @default.
- W2619377 creator A5020975010 @default.
- W2619377 date "2001-01-01" @default.
- W2619377 modified "2023-09-27" @default.
- W2619377 title "Moving from Security to Distributed Trust in Ubiquitous Computing Environments" @default.
- W2619377 cites W1517141531 @default.
- W2619377 cites W1526098002 @default.
- W2619377 cites W2053843411 @default.
- W2619377 cites W2103386066 @default.
- W2619377 cites W2128026023 @default.
- W2619377 cites W2135300639 @default.
- W2619377 cites W2170496240 @default.
- W2619377 cites W2993902586 @default.
- W2619377 cites W23685451 @default.
- W2619377 hasPublicationYear "2001" @default.
- W2619377 type Work @default.
- W2619377 sameAs 2619377 @default.
- W2619377 citedByCount "30" @default.
- W2619377 countsByYear W26193772012 @default.
- W2619377 countsByYear W26193772015 @default.
- W2619377 crossrefType "journal-article" @default.
- W2619377 hasAuthorship W2619377A5009972149 @default.
- W2619377 hasAuthorship W2619377A5013709154 @default.
- W2619377 hasAuthorship W2619377A5020975010 @default.
- W2619377 hasConcept C107457646 @default.
- W2619377 hasConcept C110875604 @default.
- W2619377 hasConcept C1304207 @default.
- W2619377 hasConcept C136764020 @default.
- W2619377 hasConcept C148417208 @default.
- W2619377 hasConcept C172195944 @default.
- W2619377 hasConcept C38652104 @default.
- W2619377 hasConcept C41008148 @default.
- W2619377 hasConcept C527821871 @default.
- W2619377 hasConceptScore W2619377C107457646 @default.
- W2619377 hasConceptScore W2619377C110875604 @default.
- W2619377 hasConceptScore W2619377C1304207 @default.
- W2619377 hasConceptScore W2619377C136764020 @default.
- W2619377 hasConceptScore W2619377C148417208 @default.
- W2619377 hasConceptScore W2619377C172195944 @default.
- W2619377 hasConceptScore W2619377C38652104 @default.
- W2619377 hasConceptScore W2619377C41008148 @default.
- W2619377 hasConceptScore W2619377C527821871 @default.
- W2619377 hasLocation W26193771 @default.
- W2619377 hasOpenAccess W2619377 @default.
- W2619377 hasPrimaryLocation W26193771 @default.
- W2619377 hasRelatedWork W148324816 @default.
- W2619377 hasRelatedWork W1515421369 @default.
- W2619377 hasRelatedWork W1564244485 @default.
- W2619377 hasRelatedWork W1875833779 @default.
- W2619377 hasRelatedWork W1969718672 @default.
- W2619377 hasRelatedWork W2026155725 @default.
- W2619377 hasRelatedWork W2047471687 @default.
- W2619377 hasRelatedWork W2099042427 @default.
- W2619377 hasRelatedWork W2120611165 @default.
- W2619377 hasRelatedWork W2128026023 @default.
- W2619377 hasRelatedWork W2129668244 @default.
- W2619377 hasRelatedWork W2153034411 @default.
- W2619377 hasRelatedWork W2161644106 @default.
- W2619377 hasRelatedWork W2162435698 @default.
- W2619377 hasRelatedWork W2167038410 @default.
- W2619377 hasRelatedWork W2170496240 @default.
- W2619377 hasRelatedWork W2186857320 @default.
- W2619377 hasRelatedWork W2387920645 @default.
- W2619377 hasRelatedWork W2087303800 @default.
- W2619377 hasRelatedWork W78333963 @default.
- W2619377 isParatext "false" @default.
- W2619377 isRetracted "false" @default.
- W2619377 magId "2619377" @default.
- W2619377 workType "article" @default.