Research of Information Security Framework in Ubiquitous Environment

Article Preview

Abstract:

Ubiquitous Computing has been viewed as the promising computing mode and noticed universally. The security problem gets more important. This article first gives the features of the ubiquitous environment and then analyzes the information security requirements in ubiquitous environment and finally designs the security framework for ubiquitous environment.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

1397-1399

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Weiser M, The Computer for the 21st Century, Sci-Amer., Sept. (1991).

Google Scholar

[2] Weiser M, Some Computer Science Issues in Ubiquitous Computing Commn, ACM. 1993, 36(7): 72-84.

Google Scholar

[3] Banerjee S , Bhattacharjee B, A Comparative Study of Application Layer Multicast Protocols [A] . In : submitted for review , (2002).

Google Scholar

[4] Pendarakis D , Shi S , Verma D , et al . ALMI : An Application Level Multicast Inf rast ructure [A] . In : Proceedings of t he 3rd USENIX Symposium on Internet Technologies & Systems [ C] , San Francisco , 2001. 49-60.

Google Scholar

[5] Li Z , Mohapat ra P. HostCast : A New Overlay Multicasting Pro2 tocol [A] . In : Proceedings of IEEE Int . Communications Confer2 ence ( ICC) [ C] . Alaska , 2003. 702-706.

DOI: 10.1109/icc.2003.1204265

Google Scholar

[6] Ratnasamy S , Handley M , Karp R , et al . Applicationlevel multicast using content addressable networks [A] . In : Proceedings of 3rd Int . Workshop on Networked Group Communication [ C] , London , 2001. 14-29.

DOI: 10.1007/3-540-45546-9_2

Google Scholar