Title of article :
Security middleware approaches and issues for ubiquitous applications
Author/Authors :
Jameela Al-Jaroodi ، نويسنده , , Imad Jawhar، نويسنده , , Alyaziyah Al-Dhaheri، نويسنده , , Fatmah Al-Abdouli، نويسنده , , Nader Mohamed، نويسنده ,
Issue Information :
دوهفته نامه با شماره پیاپی سال 2010
Abstract :
Recently, ubiquitous computing and pervasive environments evolved tremendously and
became an integral part of many fields and application domains. This is widely attributed
to their seamless integration with many everyday components and efficiency in handling
business and personal tasks. As a result, technologies to facilitate their development,
integration and security also evolved. Middleware is an essential layer in the architecture of
these new systems, and recently, more emphasis has been put on security middleware as an
enabling component for ubiquitous applications. This is due to the high levels of personal
and private data sharing in these systems. In this paper, we review some representative
security middleware approaches and highlight their various properties, characteristics, and
challenges. The review reveals that several options are available; however, there are still
many issues and challenges to be addressed to achieve more efficient security middleware.
Keywords :
Pervasive environments , Authentication , Ad hoc networks , Security middleware , P2P systems , Ubiquitous computing
Journal title :
Computers and Mathematics with Applications
Journal title :
Computers and Mathematics with Applications