PryGuard: A Secure Distributed Authentication Protocol for Pervasive Computing Environment

Author(s):  
Chowdhury Hasan ◽  
Mohammad Adibuzzaman ◽  
Ferdaus Kawsar ◽  
Munirul Haque ◽  
Sheikh Iqbal Ahamed
Author(s):  
James F. Peters ◽  
Tony Szturm ◽  
Maciej Borkowski ◽  
Dan Lockery ◽  
Sheela Ramanna ◽  
...  

Author(s):  
Ratneshwer N/A

In order to develop software components that are reusable across the pervasive computing applications it would be required to consider the variations and properties (mobility, adaptability, composability, context awareness etc.) that may be required for different pervasive computing applications (application types). It should go without saying that various requirements and variations may not always be known a priori and hence developing all the multiple variants may not always be possible or feasible. It is quite unlikely that all the pervasive computing applications would be able to reuse a component ‘as-is’ always. One idea is to use lightweight components such that the overheads (those that are not required in a particular pervasive computing application) do not get transported with the body of the component. Based on this idea, a model of “Generic Component” with ‘Component Generator’ has been proposed that will generate components according to the requirements of a specific pervasive computing application. This work starts a discussion and calls for more extensive research oriented studies by professionals and academicians for perfection of the model.


Author(s):  
Grace Li

Pervasive computing and communications is emerging rapidly as an exciting new paradigm and discipline to provide computing and communication services all the time and everywhere. Its systems are now invading every aspect of life to the point that they are disappearing inside all sorts of appliances or can be worn unobtrusively as part of clothing and jewelry. This emergence is a natural outcome of research and technological advances in wireless networks, embedded systems, mobile computing, distributed computing, and agent technologies. At the same time, this emergence brings challenging issues to the legal framework surrounding it. As well recognized, law is a discipline that has direct relevance to human behaviour and its adjoining environment. Thus, a study of law can be a study of the living environment and the people who are in it. This surely brings difficulties for us to study the law in a future scenario such as pervasive computing environment. Attempting to forecast the future of law, technology, and human behavior is a very risky proposition. Hence, it is impossible to fully discuss topics such as “legal aspects of pervasive computing”. This chapter aims to provide a general observation of various legal issues connecting with pervasive computing technologies. To avoid a skeleton introduction piece, the main part of this chapter concentrates on three particular issues: Jurisdiction and the choice of law issue, electronic fraud issue, and the privacy issue. These three are unsettled issues in the current computing environment and believed to become more complicated and controversial in the near future with a wider adoption of ubiquitous computing technology. In the end, this chapter suggests that, to serve the future computing environment better, the legal and regulatory framework should focus on the improvement of internal monitoring of risks and vulnerabilities greater information sharing about these risks and vulnerabilities. Moreover, the role of government should focus on education and training on the care and use of these technologies and better reporting of risks and responses. A fully embedded computing environment that is safe and sound to live in will need more collaboration between individuals, commercial organizations, and the government.


Sign in / Sign up

Export Citation Format

Share Document