Towards Development of an Intelligent Framework for Managing Authorization Service in Ubiquitous Enterprise Computing Environment

被引:0
|
作者
Kaur, Supreet [1 ]
Singh, Kawaljeet [2 ]
机构
[1] Punjabi Univ, Reg Ctr IT & Management, Mohali, India
[2] Punjabi Univ, UCC, Patiala, Punjab, India
关键词
Access Control; Computational Intelligence; Ubiquitous Computing; ACCESS-CONTROL; MODEL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Traditional security mechanisms and models may not provide adequate guarantees to deal with the new exposures and vulnerabilities of emerging Ubiquitous computing environment. Ubiquitous Computing environment characteristics make the security problem complex and challenging. In this paper we discuss how computationally intelligent based approach can be used to design an intelligent model for managing security issues related to authorization service in ubiquitous enterprise computing environment.
引用
收藏
页码:51 / +
页数:3
相关论文
共 50 条
  • [1] Ubiquitous Computing: Driving in the Intelligent Environment
    Bran, Emanuela
    Bautu, Elena
    Sburlan, Dragos Florin
    Puchianu, Crenguta Madalina
    Popovici, Dorin Mircea
    MATHEMATICS, 2021, 9 (21)
  • [2] A Gnutella inspired ubiquitous service discovery framework for pervasive computing environment
    Xu, Tianyin
    Ye, Baoliu
    Kubo, Mitsunori
    Shinozaki, Arata
    Lu, Sanglu
    2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 712 - +
  • [3] A service discovery framework for ubiquitous computing
    Gu, Xiaoguang
    Shi, Hongzhou
    Ye, Jian
    Zhu, Zhenmin
    EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2007, : 175 - 176
  • [4] Towards an Open Ubiquitous Computing Environment
    Liu, Yong
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 385 - 386
  • [5] Towards mobile ubiquitous service environment
    Ji, Yang
    Zhang, Ping
    Hu, Zheng
    Wang, Xu
    Li, Yinong
    Tang, Xiaosheng
    WIRELESS PERSONAL COMMUNICATIONS, 2006, 38 (01) : 67 - 78
  • [6] Towards Mobile Ubiquitous Service Environment
    JI Yang
    Zhang Ping
    Hu Zheng
    Wang Xu
    Li Yinong
    Tang Xiaosheng
    Wireless Personal Communications, 2006, 38 : 67 - 78
  • [7] An adaptive authentication and authorization model for service oriented enterprise computing
    Ibrahim, Mohamed
    Mohamed, Beer
    Hassan, Mohd Fadzil
    KUWAIT JOURNAL OF SCIENCE, 2022, 49 (01)
  • [8] A Hierarchical Service Discovery Framework for Ubiquitous Computing
    Gu, Xiaoguang
    Shi, Hongzhou
    Ye, Jian
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 307 - 312
  • [9] Seamless provisioning of service in the ubiquitous computing environment
    Chen, EY
    Zhang, DG
    Shi, YC
    Xu, GY
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 1904 - 1909
  • [10] Autonomic service reconfiguration in a ubiquitous computing environment
    Kim, Yoonhee
    Kim, Eun-Kyung
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, 2006, 4330 : 584 - +