{"title":"普适计算中的安全范式","authors":"Antonio Colella, Clara Maria Colombini","doi":"10.1109/IMIS.2012.192","DOIUrl":null,"url":null,"abstract":"The vast development of Information and Communication Technologies and the innovations applied in the field of governance and management push the researchers to change their perspectives in finding new security paradigms. The major effort regards the capability to identify some appropriate tools that have the characteristic of better fit with the ``object'' to protect in the real world. One of main aspect that can ensure the success in this operation is the correct integration and harmonization of the human factor with all remaining factors of a security system. This paper discusses why the CIA (Confidentiality, Integrity and Availability) paradigm is no more valid and able to perform its effect in a post-modern world, and why Cloud and Pervasive Computing requires a new approach in which the user become the main actor of the entire security system.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Security Paradigm in Ubiquitous Computing\",\"authors\":\"Antonio Colella, Clara Maria Colombini\",\"doi\":\"10.1109/IMIS.2012.192\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The vast development of Information and Communication Technologies and the innovations applied in the field of governance and management push the researchers to change their perspectives in finding new security paradigms. The major effort regards the capability to identify some appropriate tools that have the characteristic of better fit with the ``object'' to protect in the real world. One of main aspect that can ensure the success in this operation is the correct integration and harmonization of the human factor with all remaining factors of a security system. This paper discusses why the CIA (Confidentiality, Integrity and Availability) paradigm is no more valid and able to perform its effect in a post-modern world, and why Cloud and Pervasive Computing requires a new approach in which the user become the main actor of the entire security system.\",\"PeriodicalId\":290976,\"journal\":{\"name\":\"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"volume\":\"62 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMIS.2012.192\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2012.192","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The vast development of Information and Communication Technologies and the innovations applied in the field of governance and management push the researchers to change their perspectives in finding new security paradigms. The major effort regards the capability to identify some appropriate tools that have the characteristic of better fit with the ``object'' to protect in the real world. One of main aspect that can ensure the success in this operation is the correct integration and harmonization of the human factor with all remaining factors of a security system. This paper discusses why the CIA (Confidentiality, Integrity and Availability) paradigm is no more valid and able to perform its effect in a post-modern world, and why Cloud and Pervasive Computing requires a new approach in which the user become the main actor of the entire security system.