Download now Free registration required
As portable devices have become a part of the authors' everyday life, more people are unknowingly participating in a pervasive computing environment. People might engage in many computational devices simultaneously without even the awareness of their existence. The idea of pervasive computing is that almost every device they see today will be capable of communication and function in collaboration with one another in the near future. Due to lack of a fixed infrastructure for authentication and authorization, devices in pervasive computing are more susceptible to malicious snoopers. In this paper, they cover different pervasive computing-based projects that have adopted pervasive middleware as an integral part of the security enforcement in their projects.
- Format: PDF
- Size: 309.03 KB