search query: @keyword Middleware / total: 39
reference: 9 / 39
Author: | Ergawy, Amr Ibrahim Ahmed |
Title: | Privacy aware key establishment for publish/subscribe infrastructures in Ubiquitous environments |
Publication type: | Master's thesis |
Publication year: | 2008 |
Pages: | 128 Language: eng |
Department/School: | Informaatio- ja luonnontieteiden tiedekunta |
Main subject: | Tietokoneverkot (T-110) |
Supervisor: | Tarkoma, Sasu ; Sjödin, Peter |
Instructor: | Tarkoma, Sasu |
Electronic version URL: | http://urn.fi/URN:NBN:fi:aalto-201409252676 |
OEVS: | Electronic archive copy is available via Aalto Thesis Database.
Instructions Reading digital theses in the closed network of the Aalto University Harald Herlin Learning CentreIn the closed network of Learning Centre you can read digital and digitized theses not available in the open network. The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/ You can read theses on the Learning Centre customer computers, which are available on all floors.
Logging on to the customer computers
Opening a thesis
Reading the thesis
Printing the thesis
|
Location: | P1 Ark Aalto | Archive |
Keywords: | middleware publish/subscribe ubiquitous environment privacy policy encryption key establishment secure group communication |
Abstract (eng): | Ubiquitous Computing, UbiComp, is a vision of embedding computing to every aspect of our day to day life. In ubiquitous computing, interaction among communicating entities exists in highly dynamic, large scale and failure prone environments. Publish/Subscribe interaction paradigm, Pub/Sub, can be used to decouple interacting entities in ubiquitous environments by delivering events based on users interests. In this scenario, securing events dissemination and protecting users' privacy are essential requirements for ubiquitous applications. In this thesis, we propose an encryption key establishment scheme for encrypting disseminated events in ubiquitous Pub/Sub infrastructures. The proposed key establishment scheme considers the dynamism, scalability and failure tolerance issues of ubiquitous environments. More importantly, the generated encryption keys reflect multi level access control polices, which is important to enforce users' privacy polices. |
ED: | 2008-10-03 |
INSSI record number: 36371
+ add basket
INSSI