Pervasive Computing Applications And Its Security Issues &Challenges
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: This paper discusses the emerging field of pervasive computing applications and its securitychallenges, the word pervasive or ubiquitous mean "existing everywhere." It produces sevice to anyplace,anywhere, at any time service to small or portable and wearable devices. This technology create newopportunities and challenges for the Information Technology companies to place high-performance computersand sensors in virtually every device, appliance, and piece of equipment in buildings, home care,Intelligenttransport system, workplaces, and factories, and even in clothing. Pervasive computing environment or PCEshare most of the security issues of traditional networked applications. These include authentication of devicesand users, privacy of data or information, defense against malicious code such as viruses, worms, Trojan horsesetc, and access control mechanisms. Finally it describes about the future focus for the pervasive computingthrough the real time applications
Authors and Affiliations
R. UMA
Methods of Gathering Data for Research Purpose and Applications Using IJSER Acceptance Rate of Monthly Paper Publication (March 2012 Edition-May 2013 Edition)
A good number of scientist or researchers find it very difficult in carrying out their research work successfully due to lack of good knowledge of data collection method and application. Data is referred to as a...
Next Generation Genetic Algorithm for Maximum Clique Problem
Abstract: Given a graph, in the maximum clique problem, one desires to find the largest number of vertices, any two of which are adjacent. A branch-and-bound algorithm for the maximum clique problem—which is comput...
Cloud Computing: Environment of Next Generation Technology
Abstract: Cloud computing is the convergence of virtualization, Distributed Applications, Grid, Maturity of enterprise software application and enterprise IT Management. It is a tremendously attractive technology a...
Computational Intelligence Methods for Clustering of SenseTagged Nepali Documents
Abstract: This paper presents a method using hybridization of self organizing map (SOM ), particle swarmoptimization(PSO) and k-means clustering algorithm for document clustering. Document representation is animpor...
Uncompressed Image Steganography using BPCS: Survey and Analysis
Steganography is the art and science of hide secret information in some carrier data without leaving any apparent evidence of data alternation. In the past, people use hidden tattoos, invisible ink or punching on...