Abstract
Many programs are exposed a threat in the ubiquitous system. In the result, we are attacked and discharge personal information from the many factors. When executing the various application programs of a computer generally or connecting with a specific site through the Internet A place with many examples into which carry out a user and the user-identification child (ID) and the password are made to enter in order to check a user’s identity, If in agreement as compared with the identifier which a user inputs, ID which had the password registered, and a password, the authority to perform an applicable program, and the authority to use the various contents of an applicable site will be granted to the user. In this paper is provided the design of the user identification method in the ubiquitous environment. Also, We are make use of grid computing between host and targets. Therefore, This system is provide for the flexibility in the heterogeneous system.
In this paper of data was provided by PassHUB CO.,LTD. This work was supported by the Korea Research Foundation Grant funded by Government (MOEHRD) (KRF-2006-0050J03803).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Pressman, R.S.: Software Engineering. Mcgraw-hill international edition, New York (1997)
Luger, G.F.: Artificial intelligence. Addison-Wesley, Reading (2001)
Beigl, M., Gellersen, H.W., Schmidt, A.: MediaCups: Experience with Design and Use of Computer-Augmented Everyday Object. Computer Networks (May 2001)
Ponnekanti, S.R., et al.: ICrafter: A Service Framework for Ubiquitous Computing Environment. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, Springer, Heidelberg (2001)
Feeney, L., Ahlgren, B., Westerlund, A.: Spontaneous Networking: An Application oriented Approach to Ad Hoc Networking. IEEE Comm. Magazine (June 2001)
Lee, E.-S., Hwang, S.-M.: Definition of Security Requirement Items and Its Process to Security and Progress Management, LNCIS, vol. 344 (August 2006)
Lee, E.-S., Hwang, S.-M.: Design Implementation of Web Security Access Control System for Semantic Web Ontoloty. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, Springer, Heidelberg (2005)
Lee, E.-S., Lee, M.: Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement, LNCIS, vol. 344 (August 2006)
Lee, E.-S., Lee, S.-H.: Design progress management for Security Requirements in Ubiqiiuous computing using COQUALMO. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, Springer, Heidelberg (2006)
Cho, N.-d., Lee, E.-S.: Design and Implementation of Semantic Web Search System using Ontology and Anchor Text. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3984, Springer, Heidelberg (2006)
ISO/IEC 15408-1:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model
ISO. ISO/IEC 15408-2:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional requirements
ISO. ISO/IEC 15408-3:1999 Information technology - Security techniques - Evaluation criteria for IT security - Part 3: Security assurance requirements
Saba, D., Mukberjee, A.: Pervasive computing a paradigm for the 21st century. IEEE Computer Society Press, Los Alamitos (2003)
Weiser, M.: Some comuter science issues in ubiquitous comuting. IEEE Computer Society Press, Los Alamitos (1993)
Kindgerg, T.: System software for ubiquitous computing. IEEE Computer (2002)
Foster, I., Kesselman, C.: The Grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc., San Francisco (1998)
Abbas, A.: Grid Computing: Practical Guide To Technology & Applications. Charles River Media (2003)
Foster, I., Kesselman, C., Tuecke, C.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications 15(3), 200–222 (2001)
Foster, I.: What is the Grid? A Three Point Checklist. Grid Today 1(6) (July 22, 2002), http://www.gridtoday.com/02/0722/100136.html
Lee, E.-S., Kim, H.-K., Lee, S.H.: Design of the Intelligence User Identification Method for the Improved Password Input Method and the Personality Security. In: Apolloni, B., Howlett, R.J., Jain, L. (eds.) KES 2007, Part II. LNCS (LNAI), vol. 4693, pp. 581–588. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, ES., Lee, S.H. (2008). Design of the Architecture for Agent of the Personality Security in the Ubiquitous Environment. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_45
Download citation
DOI: https://doi.org/10.1007/978-3-540-78582-8_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78581-1
Online ISBN: 978-3-540-78582-8
eBook Packages: Computer ScienceComputer Science (R0)