Pervasive authentication and authorization infrastructures for mobile users.
Jordi FornéM. Francisca HinarejosAndrés MarínFlorina AlmenárezJavier LópezJosé A. MontenegroMarc LacosteDaniel Díaz SánchezPublished in: Comput. Secur. (2010)
Keyphrases
- mobile users
- context aware
- security requirements
- access control
- trust negotiation
- security mechanisms
- mobile devices
- mobile networks
- mobile phone
- mobile computing
- mobile applications
- user mobility
- mobile environments
- cellular networks
- location based services
- trust relationships
- ubiquitous computing
- context awareness
- computing environments
- mobile agents
- information sources
- internet access
- mobile services
- context aware preferences
- security policies
- ambient intelligence
- data management
- authentication protocol
- mobile commerce
- mobile technologies
- response time
- access control policies
- access points
- m learning
- location dependent
- distributed systems
- database systems
- databases