Article ID Journal Published Year Pages File Type
466388 Pervasive and Mobile Computing 2007 21 Pages PDF
Abstract

One aim of pervasive computing is to allow users to share their resources so that they seem to be part of a single pervasive computer. This is just an illusion, the result of the synergy between different systems and resources. SHAD, introduced in PerCom 2007, is the first architecture that offers actual Single Sign-On to avoid authentication obtrusiveness and maintain the illusion of a single, pervasive computer. This paper describes how SHAD allows users to securely share their resources in a easy, natural, and intuitive way. It also describes its role-based Human-to-Human architecture, the threat model, and the protocols involved. Last but not the least, it presents results of further evaluation for our working implementation.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,