TY - GEN
T1 - Activity-based security scheme for ubiquitous environments
AU - Hung, Le Xuan
AU - Hassan, J.
AU - Riaz, A. S.
AU - Raazi, S. M.K.
AU - Weiwei, Y.
AU - Canh, N. T.
AU - Truc, P. T.H.
AU - Lee, Sungyoung
AU - Lee, Heejo
AU - Son, Yuseung
AU - Fernandes, Miguel
AU - Kim, Miso
AU - Zhung, Yonil
PY - 2008
Y1 - 2008
N2 - Bardram recently introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.
AB - Bardram recently introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.
KW - Access control
KW - Activity-based computing
KW - Authentication
KW - Security
KW - Ubiuiquitous computing
UR - http://www.scopus.com/inward/record.url?scp=63049139246&partnerID=8YFLogxK
U2 - 10.1109/PCCC.2008.4745102
DO - 10.1109/PCCC.2008.4745102
M3 - Conference contribution
AN - SCOPUS:63049139246
SN - 9781424433674
T3 - Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
SP - 475
EP - 481
BT - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
T2 - 2008 IEEE International Performance Computing and Communications Conference, IPCCC 2008
Y2 - 7 December 2008 through 9 December 2008
ER -