{"title":"城市计算中的安全状态矩阵研究","authors":"Hoon Ko, C. Ramos","doi":"10.1109/ICITST.2009.5402573","DOIUrl":null,"url":null,"abstract":"Urban Computing (UrC) which process based on interactive among all objects involves all elements of users/space as computing target. That is, UrC can support better conditions than ubiquitous computing by using user/space information. However, user can't to be safe using without security processing in any computing environment. Although there are many security skills, there are difficult to adapt on dynamic changing of UrC. The most important factors of security are encrypting algorithm/the number of round of encrypt/Key size. And encrypting algorithm / the number of round of encrypting algorithm / Key size has to be changed automatically for mobile devices. To using them, we studied Security Status Matrix (SSM). In this paper is for making SSM structure based on UrC as the first version.","PeriodicalId":251169,"journal":{"name":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A study on Security Status Matrix (SSM) in Urban Computing\",\"authors\":\"Hoon Ko, C. Ramos\",\"doi\":\"10.1109/ICITST.2009.5402573\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Urban Computing (UrC) which process based on interactive among all objects involves all elements of users/space as computing target. That is, UrC can support better conditions than ubiquitous computing by using user/space information. However, user can't to be safe using without security processing in any computing environment. Although there are many security skills, there are difficult to adapt on dynamic changing of UrC. The most important factors of security are encrypting algorithm/the number of round of encrypt/Key size. And encrypting algorithm / the number of round of encrypting algorithm / Key size has to be changed automatically for mobile devices. To using them, we studied Security Status Matrix (SSM). In this paper is for making SSM structure based on UrC as the first version.\",\"PeriodicalId\":251169,\"journal\":{\"name\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"volume\":\"122 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITST.2009.5402573\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference for Internet Technology and Secured Transactions, (ICITST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITST.2009.5402573","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A study on Security Status Matrix (SSM) in Urban Computing
Urban Computing (UrC) which process based on interactive among all objects involves all elements of users/space as computing target. That is, UrC can support better conditions than ubiquitous computing by using user/space information. However, user can't to be safe using without security processing in any computing environment. Although there are many security skills, there are difficult to adapt on dynamic changing of UrC. The most important factors of security are encrypting algorithm/the number of round of encrypt/Key size. And encrypting algorithm / the number of round of encrypting algorithm / Key size has to be changed automatically for mobile devices. To using them, we studied Security Status Matrix (SSM). In this paper is for making SSM structure based on UrC as the first version.