Using adaptative encryption for ubiquitous environments

被引:0
|
作者
Izquierdo, Antonio [1 ]
Torres, Joaquin [1 ]
Sierra, Jose M. [1 ]
Carbonell, Mildrey [1 ]
机构
[1] Univ Carlos III Madrid, Avda Univ 30, Madrid 28911, Spain
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS | 2007年 / 4706卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most important issues for ubiquitous computing is the problem of encrypting content in the devices, as the heterogeneity in the devices nature, capabilities, mobility and necessities make it very difficult to find a solution that may be applied to all of these devices for the encryption and decryption of data. Although this is an important issue in today's computing, there are not proposals that suit the specific needs of the ubiquitous devices regarding power consumption and computing capabilities, as well as flexibility. In this paper we show how adaptative encryption is the base for encryption of the stored data in ubiquitous environments.
引用
收藏
页码:540 / 548
页数:9
相关论文
共 50 条
  • [1] Broadcast encryption using efficient key distribution and renewal for ubiquitous environments
    Lee, Deok-Gyu
    Park, Jang-Su
    Lee, Im-Yeong
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 721 - 730
  • [2] On the implementation of security policies with adaptative encryption
    Manzanares, Antonio Izquierdo
    Camara, Jose M. Sierra
    Marquez, Joaquin Torres
    COMPUTER COMMUNICATIONS, 2006, 29 (15) : 2750 - 2758
  • [3] Providing security for digital ecosystems with adaptative encryption
    Izquierdo, Antonio
    Sierra, Jose M.
    Torres, Joaquin
    2007 INAUGURAL IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2007, : 379 - +
  • [4] Adaptative Applications for Heterogeneous Intelligent Environments
    Almeida, Aitor
    Orduna, Pablo
    Castillejo, Eduardo
    Lopez-de-Ipina, Diego
    Sacristan, Marcos
    TOWARD USEFUL SERVICES FOR ELDERLY AND PEOPLE WITH DISABILITIES, 2011, 6719 : 1 - +
  • [5] Predicate detection using event streams in ubiquitous environments
    Kshemkalyani, AD
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 807 - 816
  • [6] Architectures for ubiquitous environments
    Salvador, Z
    Jimeno, R
    Lafuente, A
    Larrea, M
    Abascal, J
    WIMOB'2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL, 4 PROCEEDINGS, 2005, : 90 - 97
  • [7] Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments
    Kim, Mijeom
    Kumar, Mohan
    Jung, Sukju
    SMART SPACES AND NEXT GENERATION WIRED/WIRELESS NETWORKING, PROCEEDINGS, 2009, 5764 : 279 - +
  • [8] Prototyping and analysing ubiquitous computing environments using multiple layers
    Silva, Jose Luis
    Campos, Jose Creissac
    Harrison, Michael D.
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2014, 72 (05) : 488 - 506
  • [9] Using Area Learning in Spatially-Aware Ubiquitous Environments
    Chan, Edwin
    Wang, Yuxi
    Seyed, Teddy
    Maurer, Frank
    SUI'16: PROCEEDINGS OF THE 2016 SYMPOSIUM ON SPATIAL USER INTERACTION, 2016, : 205 - 205
  • [10] Ubiquitous interaction - Using surfaces in everyday environments as pointing devices
    Schmidt, A
    Strohbach, M
    van Laerhoven, K
    Gellersen, HW
    UNIVERSAL ACCESS: THEORETICAL PERSPECTIVES, PRACTICE, AND EXPERIENCE, 2003, 2615 : 263 - 279