scholarly journals Pervasive Computing Applications and Security – A Deep Insight

2021 ◽  
Author(s):  
S. Magesh ◽  
Sujatha Jamuna Anand ◽  
Niveditha V.R ◽  
Y. Pavan Kumar Reddy ◽  
P.S. Rajakumar

Pervasive computing has made life easy with communication devices. Today devise collaboration has enhanced everywhere in this environment. It has made computing devices invisible and the services. This pervasive framework provides applications with interactions, numerous cooperation and accessibility, and integration. The proposed work enumerates the applications, pervasive security challenges. It provides security predicaments by assigning certificate credentials, access controls, trust management, and some security techniques to overcome the security paradigms in these distributed networks with IoT and the pervasive computing framework. The work also encounters security perplexities in handling the security threats and user interaction issues. Nevertheless, security techniques are listed for various pervasive applications in distinct domains such as healthcare, industries, and transforming sensitive information. The smart applications with smart environments perhaps force towards the new technologies in the pervasive computing outlook. The work also embedded with middleware with the context-based situation in these pervasive applications

2018 ◽  
Vol 42 ◽  
pp. 316-321
Author(s):  
Boris I. Ananyev ◽  
Daniil A. Parenkov

The aim of the article is to show the role of parliament in the foreign policy within the framework of the conservative school of thought. The authors examine both Russian and Western traditions of conservatism and come to the conclusion that the essential idea of “the rule of the best” has turned to be one of the basic elements of the modern legislative body per se. What’s more, parliament, according to the conservative approach, tends to be the institution that represents the real spirit of the nation and national interests. Therefore the interaction of parliaments on the international arena appears to be the form of the organic communication between nations. Parliamentary diplomacy today is the tool that has the potential to address to the number of issues that are difficult to deal with within the framework of the traditional forms of IR: international security, challenges posed by new technologies, international sanctions and other.


2005 ◽  
Author(s):  
Lalana Kagal ◽  
Jeffrey Undercoffer ◽  
Filip Perich ◽  
Anupam Joshi ◽  
Tim Finin

2021 ◽  
Vol 11 (11) ◽  
pp. 4834
Author(s):  
Kai Ren Teo ◽  
Balamurali B T ◽  
Jianying Zhou ◽  
Jer-Ming Chen

Many mobile electronics devices, including smartphones and tablets, require the user to interact physically with the device via tapping the touchscreen. Conveniently, these compact devices are also equipped with high-precision transducers such as accelerometers and microphones, integrated mechanically and designed on-board to support a range of user functionalities. However, unintended access to these transducer signals (bypassing normal on-board data access controls) may allow sensitive user interaction information to be detected and thereby exploited. In this study, we show that acoustic features extracted from the on-board microphone signals, supported with accelerometer and gyroscope signals, may be used together with machine learning techniques to successfully determine the user’s touch input location on a touchscreen: our ensemble model, namely the random forest model, predicts touch input location with up to 86% accuracy in a realistic scenario. Accordingly, we present the approach and techniques used, the performance of the model developed, and also discuss limitations and possible mitigation methods to thwart possible exploitation of such unintended signal channels.


SEEU Review ◽  
2020 ◽  
Vol 15 (1) ◽  
pp. 71-85
Author(s):  
Adrian Besimi ◽  
Visar Shehu

Abstract In the last period, especially during the COVID-19 pandemics, individuals as well as institutions globally and in North Macedonia particularly, have failed to correctly respond to the new challenges related to cyber security, online attacks, and fake news. Being that in a state of isolation and quarantine most governmental institutions have heavily relied on online tools to communicate among each other and with the public, it is quite evident that they have not been well prepared to adopt new technologies. This paper aims to bridge together the needs for technology during the COVID-19 pandemics versus the security challenges that many forget to mention. The primary focus of this paper is to elaborate on the security challenges associated with technology with several examples from incidents around the world and from North Macedonia. As such, it represents a perspective paper with focus on current and emerging advances on IT security for running the “new normal” world.


Author(s):  
Feng Zhu ◽  
Wei Zhu

With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.


2018 ◽  
Vol 37 (4) ◽  
pp. 107-118
Author(s):  
Richard Thomchick ◽  
Tonia San Nicolas-Rocca

Libraries have historically made great efforts to ensure the confidentiality of patron personally identifiable information (PII), but the rapid, widespread adoption of information technology and the internet have given rise to new privacy and security challenges. Hypertext Transport Protocol Secure (HTTPS) is a form of Hypertext Transport Protocol (HTTP) that enables secure communication over the public internet and provides a deterministic way to guarantee data confidentiality so that attackers cannot eavesdrop on communications. HTTPS has been used to protect sensitive information exchanges, but security exploits such as passive and active attacks have exposed the need to implement HTTPS in a more rigorous and pervasive manner. This report is intended to shed light on the state of HTTPS implementation in libraries, and to suggest ways in which libraries can evaluate and improve application security so that they can better protect the confidentiality of PII about library patrons.


2006 ◽  
pp. 334-363 ◽  
Author(s):  
Athanasios Tsounis ◽  
Christos Anagnostopoulos ◽  
Stathes Hadjiethymiades ◽  
Izambo Karali

Pervasive computing is a broad and compelling research topic in computer science that focuses on the applications of technology to assist users in everyday life situations. It seeks to provide proactive and self-tuning environments and devices to seamlessly augment a person’s knowledge and decision making ability, while requiring as little direct user interaction as possible. Its vision is the creation of an environment saturated with seamlessly integrated devices with computing and communication capabilities. The realisation of this vision requires that a very large number of devices and software components interoperate seamlessly. As these devices and the associated software will pervade everyday life, an increasing number of software and hardware providers will deploy functionality in pervasive computing environments (PCE). That poses a very important interoperability issue, as it cannot be assumed that the various hardware and software components share common communication and data schemes. We argue that the use of Semantic Web technologies, namely the ontologies, present a intriguing way of resolving such issues and, therefore, their application in the deployment of PCE is a highly important research issue.


Author(s):  
Sebastian Schmidt

In the years around the Second World War, policymakers in the United States and Western Europe faced unique security challenges occasioned by the development of new technologies and the emergence of transnational ideological conflict. In coming to terms with these challenges, they developed the historically novel practice in which a state might maintain a long-term, peacetime military presence on the territory of another sovereign state without the subjugation of the latter. Such basing arrangements between substantive equals were previously unthinkable: under the inherited understanding of sovereignty, in which there was a tight linkage between military presence and territorial authority, such military presences could be understood only in terms of occupation or annexation. These “sovereign basing” practices, as I call them, are now central to many aspects of contemporary security politics. This book applies concepts derived from pragmatist thought to a historical study of the relations between the United States and its wartime allies to explain the origin of this phenomenon. A pragmatist lens draws attention to how the actors involved creatively recombined inherited practices in response to changes in the material and social context of action and thereby transformed the practice of sovereignty. The tools offered by pragmatism provide needed analytical leverage over the emergence of novelty and offer valuable insight into the dynamics of stability and change. The practice of sovereign basing, bound up as it is now with the constitution of interests and understanding of how states exercise power, is likely a durable feature of international politics.


Sign in / Sign up

Export Citation Format

Share Document