Title :
Research on Pervasive Computing Security
Author :
Hua, Long Zhao ; Zhen, Jia ; Tao, Li
Author_Institution :
Inst. of Comput. Sci. & Technol., Chongqing Univ. of Posts & Telecommun., Chongqing, China
Abstract :
When the concept of pervasive computing is proposed, from a simple application model to the study of various algorithms, the technology of pervasive computing is developing rapidly. This paper firstly introduced the concept of pervasive computing and its security problems. Then by introducing TePA (Tri-Element Peer Authentication) security mechanisms, an access control mechanism is introduced. It is similar with TePA security mechanism, and also fits for the features of pervasive computing. It is compatible with the current security mechanisms, and will further meet the pervasive computing specific needs.
Keywords :
authorisation; ubiquitous computing; TePA security mechanisms; access control mechanism; pervasive computing security; tri-element peer authentication; Access control; Authentication; Computational modeling; Computers; Pervasive computing; Wireless LAN; TePA; access control mechanism; pervasive computing; security mechanis;
Conference_Titel :
Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2010 7th International Conference on
Conference_Location :
Xian, Shaanxi
Print_ISBN :
978-1-4244-9043-1
Electronic_ISBN :
978-0-7695-4272-0
DOI :
10.1109/UIC-ATC.2010.39