共查询到20条相似文献,搜索用时 15 毫秒
1.
A new and non-interactive deniable authentication protocol, which is based on identity cryptography, is presented. It has no need for use of certificates. Moreover, the non-interactive protocol is practical in some applications that do not allow for interaction. 相似文献
4.
The Green Project created Java specifically for an embedded device, a handheld wireless PDA (persnal digital assistant) that was never released as a product. However, Java was launched as a new Internet language. Over time, it became popular for building desktop applications, Web services, and ubiquitous systems, partly because of its "write once, run anywhere" promise. There's no doubt that Java and PDAs are a powerful combination. In Java Development on PDAs: Building Applications for PocketPC and Palm Devices, the author writes that Java developers often have a preconception that having to choose a hardware platform is a concern of the past, since Java runs on any platform. The author discusses portability issues between the PocketPC and PalmOS devices. 相似文献
5.
The invention of the Jacquard weaving machine led to the concept of a stored "program" and "mechanized" binary information processing. This development served as the inspiration for C. Babbage's analytical engine-the precursor to the modern-day computer. Today, more than 200 years later, the link between textiles and computing is more realistic than ever. In this paper, we look at the synergistic relationship between textiles and computing and identify the need for their "integration" using tools provided by an emerging new field of research that combines the strengths and capabilities of electronics and textiles into one: electronic textiles, or e-textiles. E-textiles, also called smart fabrics, have not only "wearable" capabilities like any other garment, but also have local monitoring and computation, as well as wireless communication capabilities. Sensors and simple computational elements are embedded in e-textiles, as well as built into yarns, with the goal of gathering sensitive information, monitoring vital statistics, and sending them remotely (possibly over a wireless channel) for further processing. The paper provides an overview of existing efforts and associated challenges in this area, while describing possible venues and opportunities for future research. 相似文献
6.
As people use computers more and more, it's increasingly challenging to ensure they can all interact and share data without making proprietary or personal information too widely available to others. The Cambridge-MIT Institute is focusing its research efforts on pervasive computing challenges, including security, networking, and user interfaces. CMI invests more than US$5 million to explore ways to make computers more responsive to human needs, reducing the amount of effort people must spend interacting with the growing number of systems used in everyday life 相似文献
7.
Mobile or pervasive environments are inherently characterised by a high degree of dynamics and frequent changes in the environmental properties. This makes collaborative work of mobile users eminently difficult as the coordination of their work processes needs to adapt steadily to these changing circumstances. As location is one of the most critical changing context dimensions, this adaptive coordination and subsequent re-orientation are mostly based on distinctive temporal and spatial objects (the so-called Schelling points). The contribution of this article is to show the benefit of exploiting the human behaviour of using spatial objects for coordination (which we refer to as location-oriented coordination). We present an approach for which we implemented the location-oriented coordination considerations as a coordination pattern embedded in a coordination architecture, which serves as a runtime environment. By adopting this approach in a representative collaborative work scenario (in the domain of emergency management) and by presenting results from user tests we show its applicability and benefit. 相似文献
8.
Mobile cloud computing (MCC) is a new technology that brings cloud computing and mobile networks together. It enhances the quality of service delivered to mobile clients, network operators, and cloud providers. Security in MCC technology, particularly authentication during the handover process, is a big challenge. Current vertical handover authentication protocols encounter different problems such as undesirable delays in real-time applications, the man in the middle attack, and replay attack. In this paper, a new authentication protocol for heterogeneous IEEE 802.11/LTE-A mobile cloud networks are proposed. The proposed protocol is mainly based on the view of the 3GPP access network discovery and selection function, which uses the capacities given by the IEEE 802.11 and the 3GPP long term evolution-advanced (LTE-A) standards interconnection. A prediction scheme, with no additional load over the network, or the user is utilized to handle cloud computing issues arising during authentication in the handover process. The proposed handover authentication protocol outperformed existing protocols in terms of key confidentiality, powerful security, and efficiency which was used to reduce bandwidth consumption. 相似文献
9.
The pervasive computing age will provide easier and more satisfying ways for people to interact with their world. As a result, the ways we interact with people, information, organizations, processes, devices, appliances, places, and everyday things will change. We describe four aspects of living in the pervasive computing age from a user experience perspective: life networks will make it easy to capture, store, access, and process everything as information that flows to where authorized users need it; in attentive environments, inanimate things will seemingly become attentive and gain virtual affordances, providing users with responsive digital servants that respect privacy; with WorldBoard-like services, information will appear to exist in real places, providing users with enhanced information perception services; and intermediaries will enhance the flow of information, allowing users to get information the way they want it and securely provide personal information only when appropriate. These changes will affect the nature of information itself and provide us with many new ways to access it. We set the stage by providing an overview of some technology drivers such as improved communication, storage, processing, identification tags, sensors, displays, interaction technologies, and software technologies 相似文献
10.
云计算环境的出现改变了人们使用资源的方式。然而,随着云计算的推广,维护大型云计算环境的基础设施成本日益增长,已成为云服务供应商亟需解决的重要问题,特别是支撑云服务基础设施而产生的能源成本。因此,文中提出了一个基于能源利用效率分析的云计算模型架构,用于分析记录云计算环境运行时的资源、能源效率情况。根据分析采集的数据,云服务开发人员在创建或优化服务时可以更加有效地提高能源利用率。通过实验表明,该系统可以适应现有的云架构体系,准确地记录云计算环境下物理主机和虚拟机各项能源效率指标。 相似文献
13.
To provide mutual authentication among users, wireless networks, and service providers in roaming wireless environments, this article presents an anonymous authentication and access control protocol. Bases on this protocol, entities of different trusted domains can mutually authenticate each other and preserve the anonymity of users. Hybrid cryptosystem, secret splitting, and hash chains are used in the protocol, which decrease computational loads and establish trusted relations for both entities. The proposed protocol has the least computation complexity compared with other protocols, whereas, the security has been significantly improved. 相似文献
14.
The paper discusses access control implications when bridging Pervasive and Grid computing, and analyses the limitations of
current Grid authorisation solutions when applied to Pervasive Grid environments. The key authorisation requirements for Pervasive
Grid computing are identified and a novel Grid authorisation framework, the context-constrained authorisation framework CoCoA,
is proposed. The CoCoA framework takes into account not only users’ static attributes, but also their dynamic contextual attributes
that are inherent in Pervasive computing. It adheres to open Grid standards, uses a modular layered approach to complement
existing Grid authorisation systems, and inter-works with other Grid security building blocks. A prototype implementation
of the CoCoA framework is presented and its performance evaluated. 相似文献
15.
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device—such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services. We present a prototype implementation of our protocol using the popular Android operating system for smartphones. 相似文献
16.
随着计算机技术的飞速发展,将普适计算引入到智能校园系统的设计这一思想已日趋成熟,而上下文感知功能作为一个重要的研究方向,已经成为普适计算实现的必要条件,本文就普适计算对智能校园建设进行了全方面的分析研究. 相似文献
17.
Utility computing has the potential to greatly increase the efficiency of IT operations by sharing resources across multiple users. This sharing, however, introduces complex problems with regards to pricing and allocating these resources in a way that is fair, easy to implement, and economically efficient. In this paper, we study a queue-based model that attempts to address these issues. Each client/user has a continuous flow of jobs that need to be processed. The service rate each receives, however, is proportional to a bid it submits to the system operator. Assuming that user costs are some function of their average backlogs plus their bid amounts, we use this allocation mechanism to construct an economic game. Much previous research has shown that these types of allocation games have desirable properties if the cost functions are well-defined and convex over the space of possible outcomes. Because of its queueing interface, however, our model induces functions that do not satisfy the latter, commonly assumed properties. In spite of these complications, we show that the game still has a unique equilibrium and that the system will converge to this point if users iteratively make ??best response?? updates to their bids. Finally, we explore the ??price of anarchy?? in our model, proving a bound on efficiency losses as a function of several fundamental system parameters. Thus, our scheme results in equilibria with a number of highly desirably properties. 相似文献
18.
为了使可信计算平台之间的身份能够安全并高效地验证,通过对可信计算平台和PKI技术的研究与分析,设计一种基于PKI技术的可信计算平台之间的相互验证的协议。该协议通过引入可信第三方CA,用可信第三方向相互认证的可信平台颁发AIK证书,可信计算平台通过可信第三方验证对方AIK证书的真实性和AIK私钥加密AIK证书,验证平台的身份和完整性以及可信计算平台的状态。 相似文献
19.
Pervasive computing,which requires applications composed of independent and distributed components,is an important domain for dynamic ubiquitous heterogeneous environment.However,one of the critical challenges it faces is resource allocation.To overcome the difficulty,enhanced universal service terminal(UST+) is designed as a reflective middleware combined distributed components with particular features to achieve user goals.Moreover,a novel algorithm based on microeconomics is presented to resolve conflict... 相似文献
|