Advertisement

Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment

  • Eun-Ser Lee
  • Sang Ho Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4953)

Abstract

Many programs are exposed a threat in the ubiquitous system. In the result, we are attacked and discharge personal information from the many factors. When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user’s identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. In this paper is provided the design of the user identification method in the ubiquitous environment. Also, We are make use of grid computing between host and targets. Therefore, This system is provide for the flexibility in the heterogeneous system.

Keywords

Grid Computing Ubiquitous Computing Control Managerial System Personality Security Ubiquitous System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Pressman, R.S.: Software Engineering. Mcgraw-hill international edition, New York (1997)zbMATHGoogle Scholar
  2. 2.
    Luger, G.F.: Artificial intelligence. Addison-Wesley, Reading (2001)Google Scholar
  3. 3.
    Beigl, M., Gellersen, H.W., Schmidt, A.: MediaCups: Experience with Design and Use of Computer-Augmented Everyday Object. Computer Networks (May 2001)Google Scholar
  4. 4.
    Ponnekanti, S.R., et al.: ICrafter: A Service Framework for Ubiquitous Computing Environment. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Feeney, L., Ahlgren, B., Westerlund, A.: Spontaneous Networking: An Application oriented Approach to Ad Hoc Networking. IEEE Comm. Magazine (June 2001)Google Scholar
  6. 6.
    Lee, E.-S., Hwang, S.-M.: Definition of Security Requirement Items and Its Process to Security and Progress Management, LNCIS, vol. 344 (August 2006)Google Scholar
  7. 7.
    Lee, E.-S., Hwang, S.-M.: Design Implementation of Web Security Access Control System for Semantic Web Ontoloty. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, Springer, Heidelberg (2005)Google Scholar
  8. 8.
    Lee, E.-S., Lee, M.: Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement, LNCIS, vol. 344 (August 2006)Google Scholar
  9. 9.
    Lee, E.-S., Lee, S.-H.: Design progress management for Security Requirements in Ubiqiiuous computing using COQUALMO. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, Springer, Heidelberg (2006)Google Scholar
  10. 10.
    Cho, N.-d., Lee, E.-S.: Design and Implementation of Semantic Web Search System using Ontology and Anchor Text. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    ISO/IEC 15408-1:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model Google Scholar
  12. 12.
    ISO. ISO/IEC 15408-2:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements Google Scholar
  13. 13.
    ISO. ISO/IEC 15408-3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements Google Scholar
  14. 14.
    Saba, D., Mukberjee, A.: Pervasive computing a paradigm for the 21st century. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  15. 15.
    Weiser, M.: Some comuter science issues in ubiquitous comuting. IEEE Computer Society Press, Los Alamitos (1993)Google Scholar
  16. 16.
    Kindgerg, T.: System software for ubiquitous computing. IEEE Computer (2002)Google Scholar
  17. 17.
    Foster, I., Kesselman, C.: The Grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc., San Francisco (1998)Google Scholar
  18. 18.
    Abbas, A.: Grid Computing: Practical Guide To Technology & Applications. Charles River Media (2003)Google Scholar
  19. 19.
    Foster, I., Kesselman, C., Tuecke, C.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications 15(3), 200–222 (2001)CrossRefGoogle Scholar
  20. 20.
    Foster, I.: What is the Grid? A Three Point Checklist. Grid Today 1(6) (July 22, 2002), http://www.gridtoday.com/02/0722/100136.html
  21. 21.
    Lee, E.-S., Kim, H.-K., Lee, S.H.: Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 581–588. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Eun-Ser Lee
    • 1
  • Sang Ho Lee
    • 2
  1. 1.Computer EngineeringAndong National University 
  2. 2.College of Information Science School of ComputingSoongsil University 

Personalised recommendations