DocumentCode :
1626912
Title :
Research on Pervasive Computing Security
Author :
Hua, Long Zhao ; Zhen, Jia ; Tao, Li
Author_Institution :
Inst. of Comput. Sci. & Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China
fYear :
2010
Firstpage :
111
Lastpage :
115
Abstract :
When the concept of pervasive computing is proposed, from a simple application model to the study of various algorithms, the technology of pervasive computing is developing rapidly. This paper firstly introduced the concept of pervasive computing and its security problems. Then by introducing TePA (Tri-Element Peer Authentication) security mechanisms, an access control mechanism is introduced. It is similar with TePA security mechanism, and also fits for the features of pervasive computing. It is compatible with the current security mechanisms, and will further meet the pervasive computing specific needs.
Keywords :
authorisation; ubiquitous computing; TePA security mechanisms; access control mechanism; pervasive computing security; tri-element peer authentication; Access control; Authentication; Computational modeling; Computers; Pervasive computing; Wireless LAN; TePA; access control mechanism; pervasive computing; security mechanis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2010 7th International Conference on
Conference_Location :
Xian, Shaanxi
Print_ISBN :
978-1-4244-9043-1
Electronic_ISBN :
978-0-7695-4272-0
Type :
conf
DOI :
10.1109/UIC-ATC.2010.39
Filename :
5667216
Link To Document :
بازگشت