Authentication for ubiquitous multi domain in pervasive computing using PMI

Gyu Lee Deok, Sik Moon Jong, Hyuk Park Jong, Yeong Lee Im

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much especially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that has following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method (MD: Multi Domain) that realize authentication through device in case of moved user's direct path who device differs.

Original languageEnglish
Title of host publicationHigh Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings
PublisherSpringer Verlag
Pages515-524
Number of pages10
ISBN (Print)3540393684, 9783540393689
StatePublished - 2006
Event2nd International Conference on High Performance Computing and Communications, HPCC 2006 - Munich, Germany
Duration: 13 Sep 200615 Sep 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4208 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on High Performance Computing and Communications, HPCC 2006
Country/TerritoryGermany
CityMunich
Period13/09/0615/09/06

Keywords

  • Authentication
  • Multi domain
  • Pervasive computing
  • PMI

Fingerprint

Dive into the research topics of 'Authentication for ubiquitous multi domain in pervasive computing using PMI'. Together they form a unique fingerprint.

Cite this