2017
DOI: 10.17485/ijst/2016/v9i48/89396
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Security Schemes based on Context and Trust for Ubiquitous Computing Environment: A Comprehensive Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…A survey on different adaptive security mechanisms in the ubiquitous computing environment is given in [22]. It provides the analysis of different security methods by using different security measures based on trust and context in the continuously changing environment.…”
Section: Related Workmentioning
confidence: 99%
“…A survey on different adaptive security mechanisms in the ubiquitous computing environment is given in [22]. It provides the analysis of different security methods by using different security measures based on trust and context in the continuously changing environment.…”
Section: Related Workmentioning
confidence: 99%
“…A service access based on the user behavior (Yarmand, Sartipi & Down, 2013) provided the concept of analyzing the user characteristics while designing an adaptive security policy. Our earlier work (Jagadamba and Sathish Babu, 2016a;Jagadamba & Sathish Babu, 2013) was able to examine the user request through the contextual information before fulfilling the request. The work was more of role and context based service access but did not consider the verification of the truthfulness of the user's request.…”
Section: Literature Reviewmentioning
confidence: 99%