Security middleware approaches and issues for ubiquitous applications

Jameela Al-Jaroodi, Imad Jawhar, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed

    Research output: Contribution to journalArticlepeer-review

    18 Citations (Scopus)

    Abstract

    Recently, ubiquitous computing and pervasive environments evolved tremendously and became an integral part of many fields and application domains. This is widely attributed to their seamless integration with many everyday components and efficiency in handling business and personal tasks. As a result, technologies to facilitate their development, integration and security also evolved. Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications. This is due to the high levels of personal and private data sharing in these systems. In this paper, we review some representative security middleware approaches and highlight their various properties, characteristics, and challenges. The review reveals that several options are available; however, there are still many issues and challenges to be addressed to achieve more efficient security middleware.

    Original languageEnglish
    Pages (from-to)187-197
    Number of pages11
    JournalComputers and Mathematics with Applications
    Volume60
    Issue number2
    DOIs
    Publication statusPublished - Jul 2010

    Keywords

    • Ad hoc networks
    • Authentication
    • P2P systems
    • Pervasive environments
    • Security middleware
    • Ubiquitous computing

    ASJC Scopus subject areas

    • Modelling and Simulation
    • Computational Theory and Mathematics
    • Computational Mathematics

    Fingerprint

    Dive into the research topics of 'Security middleware approaches and issues for ubiquitous applications'. Together they form a unique fingerprint.

    Cite this