Boosting dependable ubiquitous computing: A case study

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ubiquitous computing has inherent features, e.g., a number of elements in the system with restricted communication and computation capabilities, which make harder to achieve dependability. In this work we explore this research line through the study of TrustedPals, a smartcard-based framework which allows implementing security policies in ubiquitous systems and applications in a decentralized way. The current architecture of TrustedPals uses a consensus algorithm adapted to the omission failure model. In this work, we propose to alternatively use the Paxos algorithm, in order to address more ubiquitous environments. © Springer International Publishing 2013.

Cite

CITATION STYLE

APA

Fernańdez-Campusano, C., Cortinãs, R., & Larrea, M. (2013). Boosting dependable ubiquitous computing: A case study. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8276 LNCS, pp. 42–45). https://doi.org/10.1007/978-3-319-03176-7_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free