Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Risk-Based Kerberised Service with JINI in Pervasive Environment


Affiliations
1 Department of Information Technology, SRM University, India
2 Capgemini, India
     

   Subscribe/Renew Journal


In pervasive computing environment, interactions are possible among different users and application anytime and anywhere. Pervasive is an open environment which requires strict control over resources. We may not want to offer all available services to every new user who enters the environment. To address the challenges posed in pervasive computing systems a resource discovery with risk is needed to resolve security and privacy issues. A risk evaluation becomes significant when a service request comes from an unknown user. Risk is calculated on the security level of the requested service. Token based approach is followed when the user uses the service. In this paper we discuss the emerging technology of kerberised service discovery with JINI.

Keywords

JINI, Kerberos, Pervasive Computing, Risk, Trust.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 168

PDF Views: 3




  • Risk-Based Kerberised Service with JINI in Pervasive Environment

Abstract Views: 168  |  PDF Views: 3

Authors

M. Kavitha
Department of Information Technology, SRM University, India
D. Prakash
Capgemini, India

Abstract


In pervasive computing environment, interactions are possible among different users and application anytime and anywhere. Pervasive is an open environment which requires strict control over resources. We may not want to offer all available services to every new user who enters the environment. To address the challenges posed in pervasive computing systems a resource discovery with risk is needed to resolve security and privacy issues. A risk evaluation becomes significant when a service request comes from an unknown user. Risk is calculated on the security level of the requested service. Token based approach is followed when the user uses the service. In this paper we discuss the emerging technology of kerberised service discovery with JINI.

Keywords


JINI, Kerberos, Pervasive Computing, Risk, Trust.