Security middleware approaches and issues for ubiquitous applications

Show simple item record Al-Jaroodi, Jameela Jawhar, Imad Al-Dhaheri, Alyaziyah Al-Abdouli, Fatmah Mohamed, Nader 2017-09-11T13:46:43Z 2017-09-11T13:46:43Z 2010
dc.identifier.citation J Al-Jaroodi, I Jawhar, A Al-Dhaheri, F Al-Abdouli… - Computers & Mathematics with Applications, 2010 en_US
dc.description.abstract Recently, ubiquitous computing and pervasive environments evolved tremendously and became an integral part of many fields and application domains. This is widely attributed to their seamless integration with many everyday components and efficiency in handling business and personal tasks. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications. This is due to the high levels of personal and private data sharing in these systems. In this paper, we review some representative security middleware approaches and highlight their various properties, characteristics, and challenges. The review reveals that several options are available; however, there are still many issues and challenges to be addressed to achieve more efficient security middleware. en_US
dc.language.iso en_US en_US
dc.publisher Pergamon en_US
dc.subject Ubiquitous computing en_US
dc.subject Pervasive environments en_US
dc.subject Security middleware en_US
dc.subject Authentication en_US
dc.subject Ad hoc networks en_US
dc.subject P2P systems en_US
dc.title Security middleware approaches and issues for ubiquitous applications en_US
dc.type Article en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace

Advanced Search


My Account