کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
466388 697834 2007 21 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
چکیده انگلیسی

One aim of pervasive computing is to allow users to share their resources so that they seem to be part of a single pervasive computer. This is just an illusion, the result of the synergy between different systems and resources. SHAD, introduced in PerCom 2007, is the first architecture that offers actual Single Sign-On to avoid authentication obtrusiveness and maintain the illusion of a single, pervasive computer. This paper describes how SHAD allows users to securely share their resources in a easy, natural, and intuitive way. It also describes its role-based Human-to-Human architecture, the threat model, and the protocols involved. Last but not the least, it presents results of further evaluation for our working implementation.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Pervasive and Mobile Computing - Volume 3, Issue 6, December 2007, Pages 677–697
نویسندگان
, , ,