期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Trust Based Pervasive Computing 被引量:2
1
作者 LI Shiqun Shane Balfe +1 位作者 ZHOU Jianying CHEN Kefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1477-1480,共4页
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC... Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology. 展开更多
关键词 trusted computing pervasive computing pervasive computing security
下载PDF
A PRIVACY-PRESERVING AUTHENTICATION SCHEME USING BIOMETRICS FOR PERVASIVE COMPUTING ENVIRONMENTS 被引量:1
2
作者 Yao Lin Kong Xiangwei +2 位作者 Wu Guowei Fan Qingna Lin Chi 《Journal of Electronics(China)》 2010年第1期68-78,共11页
In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other ... In pervasive computing environments,users can get services anytime and anywhere,but the ubiquity and mobility of the environments bring new security challenges.The user and the service provider do not know each other in advance,they should mutually authenticate each other.The service provider prefers to authenticate the user based on his identity while the user tends to stay anonymous.Privacy and security are two important but seemingly contradictory objectives.As a result,a user prefers not to expose any sensitive information to the service provider such as his physical location,ID and so on when being authenticated.In this paper,a highly flexible mutual authentication and key establishment protocol scheme based on biometric encryption and Diffie-Hellman key exchange to secure interactions between a user and a service provider is proposed.Not only can a user's anonymous authentication be achieved,but also the public key cryptography operations can be reduced by adopting this scheme.Different access control policies for different services are enabled by using biometric encryption technique.The correctness of the proposed authentication and key establishment protocol is formally verified based on SVO logic. 展开更多
关键词 PRIVACY SECURITY Biometric encryption pervasive computing Environments(PCEs)
下载PDF
A Solution of Data Inconsistencies in Data Integration——Designed for Pervasive Computing Environment 被引量:1
3
作者 王欣 黄林鹏 +2 位作者 章义 徐小辉 陈俊清 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第3期499-508,共10页
New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with incons... New challenges including how to share information on heterogeneous devices appear in data-intensive pervasive computing environments. Data integration is a practical approach to these applications. Dealing with inconsistencies is one of the important problems in data integration. In this paper we motivate the problem of data inconsistency solution for data integration in pervasive environments. We define data qualit~ criteria and expense quality criteria for data sources to solve data inconsistency. In our solution, firstly, data sources needing high expense to obtain data from them are discarded by using expense quality criteria and utility function. Since it is difficult to obtain the actual quality of data sources in pervasive computing environment, we introduce fuzzy multi-attribute group decision making approach to selecting the appropriate data sources. The experimental results show that our solution has ideal effectiveness. 展开更多
关键词 pervasive computing data integration data inconsistency group decision making history credibility
原文传递
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme 被引量:1
4
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 pervasive computing vehicular networks SECURITY TRUST decision schemes trusted internet of vehicles big data
下载PDF
Reality over Web:Pervasive Computing Meets the Web
5
作者 Muthucumaru Maheswaran Devarun Bhattacharya 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第6期568-576,共9页
Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or p... Reality over Web (ROW) is a novel concept, where a window on the web corresponds to a window onto a real space. Once the correspondence is established, users should be able to interact or manipulate the objects or people in the real space through the web window. In this paper, we introduce the RoW concept and highlight the principles that govern its design and implementation. A system architecture for realizing the RoW concept is described along with a proof-of-concept prototype that implements portions of the RoW concept. One essential part of an RoW implementation is accurate Iocationing of objects and people in a video frame. The Iocationing problem becomes particularly challenging because we want to reuse existing infrastructure as much as possible. We developed a high-frequency sound-based Iocationing scheme and implemented it on the prototype. The results from initial experiments performed on the Iocationing scheme are reported here. 展开更多
关键词 Internet-of-things Iocationing pervasive computing TELEPRESENCE WEB web-of-things
原文传递
Call for Papers Special Section of Tsinghua Science and Technology on Mobile and Pervasive Computing
6
《Tsinghua Science and Technology》 SCIE EI CAS 2013年第2期207-207,共1页
Tsinghua Science and Technology is founded and published since 1996. It is an international academic journal sponsored by Tsinghua University and is published bimonthly. This journal aims at presenting the up-to-date ... Tsinghua Science and Technology is founded and published since 1996. It is an international academic journal sponsored by Tsinghua University and is published bimonthly. This journal aims at presenting the up-to-date scientific achievements in computer science, and other information technology fields. It is indexed by Ei and other abstracting and indexing services. From 2013, the journal commits to the open access at IEEE Xplore Digital Library. 展开更多
关键词 Call for Papers Special Section of Tsinghua Science and Technology on Mobile and pervasive computing
原文传递
Context-Based Mobile User Interface 被引量:1
7
作者 Mao Zheng Sihan Cheng Qian Xu 《Journal of Computer and Communications》 2016年第9期1-9,共9页
Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing systems. Each context-aware application has its own set of behaviors to react to context modifications. Hence, every s... Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing systems. Each context-aware application has its own set of behaviors to react to context modifications. Hence, every software engineer needs to clearly understand the goal of the development and to categorize the context in the application. We incorporate context-based modifications into the appearance or the behavior of the interface, either at the design time or at the run time. In this paper, we present application behavior adaption to the context modification via a context-based user interface in a mobile application. We are interested in a context-based user interface in a mobile device that is automatically adapted based on the context information. We use the adaption tree, named in our methodology, to represent the adaption of mobile device user interface to various context information. The context includes the user’s domain information and dynamic environment changes. Each path in the adaption tree, from the root to the leaf, presents an adaption rule. An e-commerce application is chosen to illustrate our approach. This mobile application was developed based on the adaption tree in the Android platform. The automatic adaption to the context information has enhanced human-computer interactions. 展开更多
关键词 pervasive computing Context-Aware Systems Mobile User Interface Adaption Tree
下载PDF
Middleware for Wireless Sensor Networks:A Survey 被引量:6
8
作者 王苗苗 曹建农 +1 位作者 李京 Sajal K.Dasi 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第3期305-326,共22页
Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications ... Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications over WSNs remains to be a nontrivial and challenging task, mainly because of the gap between the high level requirements from pervasive computing applications and the underlying operation of WSNs. Middleware for WSN can help bridge the gap and remove impediments. In recent years, research has been carried out on WSN middleware from different aspects and for different purposes. In this paper, we provide a comprehensive review of the existing work on WSN middleware, seeking for a better understanding of the current issues and future directions in this field. We propose a reference framework to analyze the functionalities of WSN middleware in terms of the system abstractions and the services provided. We review the approaches and techniques for implementing the services. On the basis of the analysis and by using a feature tree, we provide taxonomy of the features of WSN middleware and their relationships, and use the taxonomy to classify and evaluate existing work. We also discuss open problems in this important area of research. 展开更多
关键词 MIDDLEWARE wireless sensor network pervasive computing
原文传递
AocML: A Domain-Specific Language for Model-Driven Development of Activity-Oriented Context-Aware Applications
9
作者 Xuan-Song Li Xian-Ping Tao +1 位作者 Wei Song Kai Dong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第5期900-917,共18页
Activity-oriented context-aware (AOCA) applications are representative in pervasive computing. These appli- cations recognize daily-life human activities, perceive the environment status related to the activities, a... Activity-oriented context-aware (AOCA) applications are representative in pervasive computing. These appli- cations recognize daily-life human activities, perceive the environment status related to the activities, and react to ensure the smooth performance of the activities. Existing research proposed a specific light-weight, incremental method to support the development of such applications; however it is not easy to learn and use. This paper aims to facilitate the development of such applications and improve the productivity of developers. We propose AocML, a textual domain-specific language which provides a high-level abstraction of AOCA applications. Specifically, we first show the software model of AOCA applications and the abstract syntax of AocML. Then, we introduce the concrete syntax of AocML. We also implement the tools for AocML, including the development environment as well as the generation of Java code and ontology specification. Moreover, we use a case study and evaluation to demonstrate the advantages of AocML. 展开更多
关键词 pervasive computing CONTEXT-AWARENESS model-driven development domain-specific language
原文传递
Towards a programming framework for activity-oriented context-aware applications
10
作者 Xuansong LI Xianping TAO Jian LU 《Frontiers of Computer Science》 SCIE EI CSCD 2017年第6期987-1006,共20页
Context-aware system is an emerging research area in recent years. Context plays an important role in these systems. In most existing work, context is treated as all rel- ative elements in the environment of an applic... Context-aware system is an emerging research area in recent years. Context plays an important role in these systems. In most existing work, context is treated as all rel- ative elements in the environment of an application, and the scope of context is predefined by the developers during the development. However, it is difficult to analyze, specify, and organize everything in the environment accurately and com- pletely; and even when it is possible, the developed applica- tions are difficult to extend or modify as the requests for en- vironment may change over time. In this paper, we focus on activity-oriented context-aware (AOCA) applications where the requests for environment are highly dependent on user activities, and propose a programming framework for devel- oping AOCA applications. In particular, we first present a concept model for describing the notions of activity-oriented context. Next, based on the concept model, we describe the details of the programming framework as well as a develop- ment tool. Moreover, we provide a platform to support the runtime of AOCA applications, and demonstrate the advan- tages of our programming framework through experimental evaluations. 展开更多
关键词 pervasive computing context-awareness context-aware programming framework activity-orientedcontext
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部