Files in this item



application/pdfAn Intelligent ... Computing Environments.pdf (1MB)
(no description provided)PDF


Title:An Intelligent Authentication Infrastructure for Ubiquitous Computing Environments
Author(s):Al-Muhtadi, Jalal F.
Subject(s):ubiquitous computing
computer security
Abstract:Ubiquitous computing is poised to have a profound effect on how humans interact with machines, physical spaces, services, everyday devices, and other humans. Ubiquitous computing envisions a world that features an abundance of embedded processors, wearable computers, smart consumer devices, sensors, and digital communication, which are all tightly coupled to form an "Active Space." Active spaces enhance education, distance learning, remote collaboration, resource sharing, group activities, and scientific studies. The shift to the ubiquitous computing paradigm brings forth new challenges to security and privacy, which cannot be addressed by mere adaptation of existing security and privacy mechanisms. Instead, novel security mechanisms must be devised. In this work, I identify the challenges and requirements of security in ubiquitous computing environments. I present the design, implementation, and evaluation of a comprehensive framework that enriches Active Spaces with novel security mechanisms and enable cornerstone security services, including identification, authentication, authorization and privacy. The presented framework is a novel solution that provides fundamentally new possibilities in providing secure and privacy-preserving ubiquitous computing environments, without impairing the value-added services and customizability that make ubiquitous computing environments unique and powerful.
Issue Date:2005-09
Genre:Technical Report
Other Identifier(s):UIUCDCS-R-2005-2537
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-20

This item appears in the following Collection(s)

Item Statistics