期刊文献+

普适计算的安全检测模型

Security detective model of ubiquitous computing
下载PDF
导出
摘要 普适计算自20世纪90年代提出以来,已经成为极具活力和影响力的研究领域之一,它的安全性问题更是受到了研究人员极大的关注。首先概括介绍了普适计算安全检测领域常用的几种方法和模型,以及它们存在的问题和不足之处;然后提出了一种新的综合检测模型,并详细阐述了它的实现方法和特点。 Ubiquitous computing has become one of the most attractive domains since it has been defined in 1990^th. The security of it is attracted more attention. Firstly, some methods of the security detection in ubiquitous computing and their existing problems are introduced. Then a new omnibus security detective model is presented. The method of the realization and its characteristic are demonstrated in detail.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第7期1151-1154,共4页 Computer Engineering and Design
基金 教育部科学技术研究重点基金项目(104086)
关键词 普适计算 构件 构件组合 信息流 安全检测 ubiquitous computing component component composition information flow security detect
  • 相关文献

参考文献15

  • 1Weiser M.The computer for the 21st century[J].Scientific American International Edition,1991,265(3):66-75.
  • 2郑增威,吴朝晖.普适计算综述[J].计算机科学,2003,30(4):18-22. 被引量:50
  • 3王乃博,曹奇英.基于CC/PP的普适计算中私有信息保护问题的研究[J].计算机工程与设计,2004,25(9):1492-1494. 被引量:5
  • 4Tennenhouse D L,Smith J M,Sincoskie W D,et al.A survey of active network research[J].IEEE Communications Magazine,1997,35(1):80-86.
  • 5Greenberg M S,Byington J C.Mobile agents and security[J].IEEE Communications Magazine,1998,12(3):76-85.
  • 6李彩霞,曹奇英.普适计算中的上下文及纯方位定位模型[J].计算机工程与设计,2005,26(1):50-52. 被引量:5
  • 7Banavar G,Bernstein A.Software infrastructure and design challenges for ubiquitous computing applications[J].Communications of the ACM,2002,45(12):92-96.
  • 8McLean J.A general theory of composition for a class ofpossibilistic properties[J].IEEE Transactions on Software Engineering,1996,22(1):53-67.
  • 9Wing J M.A symbiotic relationship between formal methods and security[J].Computer Solutions,1998,43(3):233-44.
  • 10Pfitzmann B,Waidner M.A model for asynchronous reactive systems and its application to secure message transmission[C].USA:Proc 2001 IEEE Symposium on Security and Privacy,2001.184-200.

二级参考文献49

  • 1Sandeep K,Gupta S,et al. An Overview of Pervasive Computing.IEEE Pers. Commun. , Aug. 2001.
  • 2Weiser M,Brown J S. The Coming Age of Calm Technology. In:P. J. Denning,R. M. Metcalfe, eds. Beyond Calculation: The Next Fifty Years of Computing, Copernicus, 1998.
  • 3Weiser M. Ubiquitous Computing. IEEE Computer "HotTopics", Oct. 1993.
  • 4Weiser M. Some Computer Science Issues in Ubiquitous Computing. Comm. ACM, 1993,36 (7) : 72~84.
  • 5Oviatt S,DeAngeli A,Kuhn K. Integration and Synchronization of Input Modes during Multimodal Human-Computer Interaction.ACM, 1997.
  • 6Kabbash P, MacKenzie I S, Buxton W. Human Performance Using Computer Input Devices in the Preferred and Non-Preferred Hands. In : Proc. of Inter- CHI'93,1993. 474~481.
  • 7Buxton B. UbiComp, HCI and the State of the Artist. IEEE,1996.
  • 8Abowd G,Atkeson C,Essa I. Ubiquitous Smart Spaces. A white paper submitted to DARPA, Feb. 1998.
  • 9Abowd G D,Dey A K,et al. Context-awareness in wearable and ubiquitous computing. IEEE, 1997.
  • 10Akamatsu M, MacKenzie I S,Hasbrouc T. A Comparison of Tactile, Auditory, and Visual Feedback in a Pointing Task Using a Mouse-Type Device. Ergonomics,1995, 38:816~827.

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部