{"title":"A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing","authors":"W. Claycomb, Dongwan Shin","doi":"10.1109/COLCOM.2006.361883","DOIUrl":null,"url":null,"abstract":"Impromptu collaboration, often characterized as being opportunistic, spontaneous, proximity-based, and transient, is fast becoming a common way of interactions in mobile and pervasive computing. Though continued research efforts have been made to secure this type of collaboration, the increasing computational and storage capabilities of mobile devices pose a new security challenge of access control for sharing a variety of their resources. In this paper we present a visual framework for securing impromptu collaboration in a pervasive computing environment. The framework incorporates a method of demonstrative identification of mobile devices, key-based capability list, and 2-dimensional visual barcode technology to support a convenient access control service in mobile and pervasive computing. Impromptu collaboration, often characterized as being opportunistic, spontaneous, proximity-based, and transient, is fast becoming a common way of interactions in mobile and pervasive computing. Though continued research efforts have been made to secure this type of collaboration, the increasing computational and storage capabilities of mobile devices pose a new security challenge of access control for sharing a variety of their resources. In this paper we present a visual framework for securing impromptu collaboration in a pervasive computing environment. The framework incorporates a method of demonstrative identification of mobile devices, key-based capability list, and 2-dimensional visual barcode technology to support a convenient access control service in mobile and pervasive computing","PeriodicalId":315775,"journal":{"name":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COLCOM.2006.361883","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Impromptu collaboration, often characterized as being opportunistic, spontaneous, proximity-based, and transient, is fast becoming a common way of interactions in mobile and pervasive computing. Though continued research efforts have been made to secure this type of collaboration, the increasing computational and storage capabilities of mobile devices pose a new security challenge of access control for sharing a variety of their resources. In this paper we present a visual framework for securing impromptu collaboration in a pervasive computing environment. The framework incorporates a method of demonstrative identification of mobile devices, key-based capability list, and 2-dimensional visual barcode technology to support a convenient access control service in mobile and pervasive computing. Impromptu collaboration, often characterized as being opportunistic, spontaneous, proximity-based, and transient, is fast becoming a common way of interactions in mobile and pervasive computing. Though continued research efforts have been made to secure this type of collaboration, the increasing computational and storage capabilities of mobile devices pose a new security challenge of access control for sharing a variety of their resources. In this paper we present a visual framework for securing impromptu collaboration in a pervasive computing environment. The framework incorporates a method of demonstrative identification of mobile devices, key-based capability list, and 2-dimensional visual barcode technology to support a convenient access control service in mobile and pervasive computing