Withdraw
Loading…
An Intelligent Authentication Infrastructure for Ubiquitous Computing Environments
Al-Muhtadi, Jalal F.
Loading…
Permalink
https://hdl.handle.net/2142/11049
Description
- Title
- An Intelligent Authentication Infrastructure for Ubiquitous Computing Environments
- Author(s)
- Al-Muhtadi, Jalal F.
- Issue Date
- 2005-09
- Keyword(s)
- ubiquitous computing
- computer security
- Abstract
- "Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physical spaces, services, everyday devices, and other humans. Ubiquitous computing envisions a world that features an abundance of embedded processors, wearable computers, smart consumer devices, sensors, and digital communication, which are all tightly coupled to form an ""Active Space."" Active spaces enhance education, distance learning, remote collaboration, resource sharing, group activities, and scientific studies. The shift to the ubiquitous computing paradigm brings forth new challenges to security and privacy, which cannot be addressed by mere adaptation of existing security and privacy mechanisms. Instead, novel security mechanisms must be devised. In this work, I identify the challenges and requirements of security in ubiquitous computing environments. I present the design, implementation, and evaluation of a comprehensive framework that enriches Active Spaces with novel security mechanisms and enable cornerstone security services, including identification, authentication, authorization and privacy. The presented framework is a novel solution that provides fundamentally new possibilities in providing secure and privacy-preserving ubiquitous computing environments, without impairing the value-added services and customizability that make ubiquitous computing environments unique and powerful."
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/11049
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…