Architecture and Protocol for Authorized Transient Control

نویسنده

  • Philip Robinson
چکیده

The range of Ubiquitous Computing environments envisioned are characterized as either constantly controlled by a permanent owner, i.e. a privatized environment, or support a general scope of controlling parties as in a public setting. This paper proposes a component architecture and operational protocol for an environment that and transiently changes from the first to the second, based on the validity of a so-called “controllable context”.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Transient Change in Core Strength, Endurance, and Upper Limb Isometric Strength after Core Stabilisation Knockdown Protocol in Female Athletes

Objective- We assessed the effect of change in core isometric strength and endurance on upper limb isometric strength in female athletes. Methods- In this experimental study, 32 female athletes aged 18-25 years were recruited based on the inclusion criteria. (17 cases in the experimental group and 15 cases in the control group). Before and after the core stabilization knockdown protocol, parti...

متن کامل

Access control protocols with two-layer architecture for wireless networks

In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the Stanford protocol, uses public key cryptosystems (PKC) for authe...

متن کامل

A Distributed Control Architecture for Autonomous Operation of a Hybrid AC/DC Microgrid System

Hybrid AC/DC microgrids facilitate the procedure of DC power connection into the conventional AC power system by developing the distributed generations (DGs) technologies. The conversion processes between AC and DC electrical powers are more convenient by hybrid systems. In this paper, an energy management system (EMS) for a hybrid microgrid network is proposed due to the optimal utilization of...

متن کامل

Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System

Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and a...

متن کامل

NDN-ACE: Access Control for Constrained Environments over Named Data Networking

The access control problem, including authentication and authorization, is critical to the security and privacy of the IoT networks. In this paper we present NDN-ACE, a lightweight access control protocol for constrained environments over Named Data Networking (NDN). NDN-ACE uses symmetric cryptography to authenticate the actuation commands on the constrained devices but offloads the key distri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004