A secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios

被引:0
|
作者
Lopez, Javier [1 ]
Mana, Antonio [1 ]
Munoz, Antonio [1 ]
机构
[1] Univ Malaga, GISUM Grp, Dept Comp Sci, ETSI Informat, E-29071 Malaga, Spain
来源
UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS | 2006年 / 4159卷
关键词
security; agents; profiles; trusted computing; ubiquitous computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The increased heterogeneity and dynamism of new computing paradigms and especially of ubiquitous computing models is boosting the need for auto-configurable systems. In these new scenarios, heterogeneity and dynamism are inherent properties and applications are built by aggregating distributed information and services that are not under the control of a single entity. The current trend towards distributed computing poses important problems related to the transmission of large amounts of data between the nodes of the computing system; the control over the information; and the flexibility to adapt to heterogeneous client requirements. These characteristics, difficult to manage by traditional computing models, are making the mobile agent paradigm to gain momentum and increasing the interest of researchers and industry in this paradigm. In this paper we present a solution to provide a secure and auto-configurable environment for mobile agents in ubiquitous computing scenarios, based on two main building blocks: trusted platforms and profiles.
引用
收藏
页码:977 / 987
页数:11
相关论文
共 10 条
  • [1] Implementing a Mobile Identity Application in a Ubiquitous Computing Environment
    Byrnes, Christopher R.
    Rimaldi, Tyler, V
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 222 - 228
  • [2] Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment
    Seo, DongBum
    Lee, Keun-Ho
    Jeon, You-Boo
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 742 - 749
  • [3] A remote display environment: An integration of mobile and ubiquitous computing environments
    Uemukai, T
    Hara, T
    Tsukamoto, M
    Nishio, S
    WCNC 2002: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1 & 2, 2002, : 618 - 624
  • [4] Secure access policy for efficient resource in mobile computing environment
    Jo S.-M.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (04) : 297 - 303
  • [5] Cloud computing for ubiquitous computing on M2M and IoT environment mobile application
    Seo, DongBum
    Jeon, You-Boo
    Lee, Song-Hee
    Lee, Keun-Ho
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (02): : 1001 - 1013
  • [6] Cloud computing for ubiquitous computing on M2M and IoT environment mobile application
    DongBum Seo
    You-Boo Jeon
    Song-Hee Lee
    Keun-Ho Lee
    Cluster Computing, 2016, 19 : 1001 - 1013
  • [7] Protection and interoperability for mobile agents: A secure and open programming environment
    Bellavista, P
    Corradi, A
    Stefanellii, C
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2000, E83B (05) : 961 - 972
  • [8] A framework for personal mobile agents in wireless pervasive computing environment
    Ulema, A.
    Waldman, M.
    Kozbe, B.
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 107 - +
  • [9] ASMCC+: A Secure Authentication Scheme for Mobile Cloud Computing Environment Based on Zero Trust Architecture
    Hossain, Md Jakir
    Seid, Abegaz Mohammed
    Abishu, Hayla Nahom
    Dharejo, Fayaz Ali
    Jhaveri, Rutvij H.
    Erbad, Aiman
    Alathbah, Moath
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 6236 - 6249
  • [10] Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
    Jangirala, Srinivas
    Das, Ashok Kumar
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (11) : 7081 - 7093