{"title":"User Access of Public Shared Devices in Pervasive Computing Environments","authors":"D. Jea, I. Yap, M. Srivastava","doi":"10.1109/HCMDSS-MDPNP.2007.12","DOIUrl":null,"url":null,"abstract":"To allow for an efficient usage of a device in pervasive computing environments when a user intends to selectively utilize multiple devices within his/her vicinity, reliable and yet convenient authentication is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the issues of establishing sessions to such devices (logging in, maintaining a session, and logging out), and then identifies the common pitfall of access-control contexts. We propose an improved context-aware solution that supports a secure, selective, and identifiable user access of public shared devices with high usability.","PeriodicalId":47140,"journal":{"name":"Medical Devices-Evidence and Research","volume":"3 1","pages":"57-63"},"PeriodicalIF":1.3000,"publicationDate":"2007-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Medical Devices-Evidence and Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HCMDSS-MDPNP.2007.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, BIOMEDICAL","Score":null,"Total":0}
引用次数: 5
Abstract
To allow for an efficient usage of a device in pervasive computing environments when a user intends to selectively utilize multiple devices within his/her vicinity, reliable and yet convenient authentication is an important requirement. The problem becomes more complex when the accessed device is shared by the public with many different individuals. This paper first illustrates the issues of establishing sessions to such devices (logging in, maintaining a session, and logging out), and then identifies the common pitfall of access-control contexts. We propose an improved context-aware solution that supports a secure, selective, and identifiable user access of public shared devices with high usability.