Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07) 2007
DOI: 10.1109/percom.2007.31
|View full text |Cite
|
Sign up to set email alerts
|

SHAD: A Human-Centered Security Architecture for the Plan B Operating System

Abstract: This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security architecture. It is based in a general purpose personal device that manages the user's security: the UbiTerm. There are several other systems that, at first sight, seem to provide Single Sign-On in ubiquitous environments. We argue that they fail to do so in practice, and that SHAD offers for the first time a real SSO that works well… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Some proposals introduce mechanisms for SSO and seamless access control, but they're usually limited to a particular scenario or set of devices. 5,6 We need to evolve IdM one step further; the merging and usage of well-known FIM protocols seems a natural approach.…”
Section: The Challenges Of Pervasive Idmmentioning
confidence: 99%
“…Some proposals introduce mechanisms for SSO and seamless access control, but they're usually limited to a particular scenario or set of devices. 5,6 We need to evolve IdM one step further; the merging and usage of well-known FIM protocols seems a natural approach.…”
Section: The Challenges Of Pervasive Idmmentioning
confidence: 99%