Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secure and Private Service Discovery in Pervasive Computing Environments

View through CrossRef
With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.
Title: Secure and Private Service Discovery in Pervasive Computing Environments
Description:
With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing.
Every year, billions of computing devices are built.
They are ubiquitously deployed and are gracefully integrated with people and their environments.
Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other.
Authentication for pervasive service discovery is difficult.
In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes.
It encodes hundreds of authentication messages in a novel code word form.
Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people.
A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first.
We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.

Related Results

Service discovery mechanisms in cloud computing: a comprehensive and systematic literature review
Service discovery mechanisms in cloud computing: a comprehensive and systematic literature review
PurposeThe main goal of this paper is to study the cloud service discovery mechanisms. In this paper, the discovery mechanisms are ranked in three major classes: centralized, decen...
Tools for interdisciplinary design of pervasive computing
Tools for interdisciplinary design of pervasive computing
PurposeTo be successful, pervasive computing requires a balance of computing, design, and business requirements to be considered throughout the design process. Achieving this synth...
Security in Pervasive Computing
Security in Pervasive Computing
Security requirements for pervasive computing environments are different from those in fixed networks. This is due to the intensity and complexity of the communication between the ...
Persons and Their Private Personas: Living with Yourself
Persons and Their Private Personas: Living with Yourself
Public life is usually understood to be whatever we do or say in our formal and professional relationships. At the workplace, at the doctor’s office or at the café, we need to make...
Deploying Pervasive Technologies
Deploying Pervasive Technologies
Communication technologies are currently addressing our daily lives. Internet, fixed-line networks, wireless networks, and sensor technologies are converging, and seamless communic...
Adverbs in -ως in Documents of Graeco-Roman Egypt
Adverbs in -ως in Documents of Graeco-Roman Egypt
This book is part of an ongoing research to investigate adverbials in the ancient Greek language. This first volume is devoted to the use of the adverbs in -ως in texts from Graeco...
Moderating Effects of Service Guarantee, Service Relationship, and Perceived-risk on Customer Satisfaction
Moderating Effects of Service Guarantee, Service Relationship, and Perceived-risk on Customer Satisfaction
Customer satisfaction has been one of the most frequently used terms in marketing. With the benefits of customer satisfaction, service providers can save more costs doing customer ...
Meta Model Context Based Space for Ubiquitous Computing
Meta Model Context Based Space for Ubiquitous Computing
Pervasive computing is a paradigm that focuses on the availability of computer resources anytime anywhere for any application and supports integration of computing services into ev...

Back to Top