2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2012
DOI: 10.1109/imis.2012.192
|View full text |Cite
|
Sign up to set email alerts
|

Security Paradigm in Ubiquitous Computing

Abstract: The vast development of Information and Communication Technologies and the innovations applied in the field of governance and management push the researchers to change their perspectives in finding new security paradigms. The major effort regards the capability to identify some appropriate tools that have the characteristic of better fit with the "object" to protect in the real world.One of main aspect that can ensure the success in this operation is the correct integration and harmonization of the human facto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…The main idea was to generate a sort of trust and co-partnership between customers and security organizations in order to enhance the awareness transforming users into stakeholders. As we point out in a previous papers about security paradigm in ubiquitous computing [1], even a pervasive computing system that strives to be minimally intrusive has to be context-aware. In other words, it must be cognizant of its user's state and surroundings, and must modify its behavior based on this information [3].…”
Section: Hypothesis Of An Adaptable Model Based On Consumerizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The main idea was to generate a sort of trust and co-partnership between customers and security organizations in order to enhance the awareness transforming users into stakeholders. As we point out in a previous papers about security paradigm in ubiquitous computing [1], even a pervasive computing system that strives to be minimally intrusive has to be context-aware. In other words, it must be cognizant of its user's state and surroundings, and must modify its behavior based on this information [3].…”
Section: Hypothesis Of An Adaptable Model Based On Consumerizationmentioning
confidence: 99%
“…In a previous paper [1] we presented the human factor as the main element around which set up a dynamic model. The organizational and technical factors are still important, but alone they can not ensure an effective and efficient security system.…”
Section: Introductionmentioning
confidence: 99%
“…[19], [20], and [21]. However, to the best of our knowledge, Colella and Colombini [22] are the only authors who-briefly-discussed security awareness to address threats related to pervasive computing. There is currently no work on SDSC.…”
Section: Operational Interruptionmentioning
confidence: 99%
“…Nowadays, ubiquitous (or pervasive) computing, including ambient intelligence, augmented reality, or proactive computing [1], is a hot topic in the information area. Cloud computing is a typical technology in this field.…”
Section: Introductionmentioning
confidence: 99%
“…Some methods have tried to integrate the management paradigm with critical factors and other requirements in cloud security. Colella and Colombini [1] suggested the centrality of the human factor (other factors are organization and technical factors) and a dynamic approach to both external and internal threats. Ramgovind et al [11] discussed information security requirements and control methods in cloud computing.…”
Section: Introductionmentioning
confidence: 99%