Nothing Special   »   [go: up one dir, main page]

To read this content please select one of the options below:

Deploying pervasive secure knowledge management infrastructures

Apostolos Malatras (Department of Electronic Engineering, Centre for Communications Systems Research, University of Surrey, UK)
George Pavlou (Department of Electronic Engineering, Centre for Communications Systems Research, University of Surrey, UK)
Petros Belsis (Department of Information and Communication Systems Engineering University of the Aegean, Karlovasi, Samos, Greece)
Stefanos Gritzalis (Department of Information and Communication Systems Engineering University of the Aegean, Karlovasi, Samos, Greece)
Christos Skourlas (Department of Informatics, Technological Education Institute, Athens, Greece)
Ioannis Chalaris (Department of Informatics, Technological Education Institute, Athens, Greece)

International Journal of Pervasive Computing and Communications

ISSN: 1742-7371

Article publication date: 1 November 2005

182

Abstract

Pervasive environments are mostly based on the ad hoc networking paradigm and are characterized by ubiquity in both users and devices and artifacts. In these inherently unstable conditions and bearing in mind the resource’s limitations that are attributed to participating devices, the deployment of Knowledge Management techniques is considered complicated due to the particular requirements. Security considerations are also very important since the distribution of knowledge information to multiple locations over a network, poses inherent problems and calls for advanced methods in order to mitigate node misbehaviour and in order to enforce authorized and authenticated access to this information. This paper addresses the issue of secure and distributed knowledge management applications in pervasive environments. We present a prototype implementation after having discussed detailed design principles as far as the communications and the application itself is regarded. Robustness and lightweight implementation are the cornerstones of the proposed solution. The approach we have undertaken makes use of overlay networks to achieve efficiency and performance optimization, exploiting ontologies. The work presented in this paper extends our initial work to tackle this problem, as this was described in (28).

Keywords

Citation

Malatras, A., Pavlou, G., Belsis, P., Gritzalis, S., Skourlas, C. and Chalaris, I. (2005), "Deploying pervasive secure knowledge management infrastructures", International Journal of Pervasive Computing and Communications, Vol. 1 No. 4, pp. 265-276. https://doi.org/10.1108/17427370580000130

Publisher

:

Emerald Group Publishing Limited

Copyright © 2005, Emerald Group Publishing Limited

Related articles