Abstract

Objectives: To present the principle of working of some of the widely used adaptive security schemes in the domain of ubiquitous computing. Methods/Statistical Analysis: The main focus of the study includes analysis of the security schemes with respect to the use of security parameters such as context and trust. Many security schemes applied for various applications are considered and evaluated by considering the security credentials such as access control, privacy, and context-awareness. The study finds context and trust as essential to develop adaptive and accurate security framework. Findings: The paper identified different taxonomies built for trust, context, policy and adaptive security. It pointed many solutions to couple with the security issues like access control, and authentication that are more appropriate to the today’s world. It also discussed many security and implementation credentials with a review summary and suggested the findings could be used to propose adaptive security frameworks which can offer the required level of security. Application/Improvements: The proposed framework can be used to applications built in the Ubiquitous Computing Environment (UCE) such as Ubiquitous-healthcare, U-learning, U-smart campus, and so on.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call