z-logo
open-access-imgOpen Access
Secured Policy based Resource Access and User Authentication in Ubiquitous Computing Environment
Author(s) -
Dr.S. Pandikumar*,
S. Malathi,
M. Arun,
Krishan Kumar,
R. Kalpana
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.a4731.119119
Subject(s) - computer science , authentication (law) , access control , ubiquitous computing , context (archaeology) , shared resource , computer security , computer network , world wide web , paleontology , biology , operating system
Policy-based resource access and data sharing are the most specific in context-aware computing. Granting authentication to the wireless and ad hoc users is usually difficult because the system has got to take into account several context factors whereas authoring access. During this epoch, the mobile phone plays a significant role in info access in a ubiquitous environment. Wireless technologies, significantly the GSM-SMS is efficient and efficient to access shared data around the world with fewer security issues. The shared resources like printers, scanners, databases, books, email, etc. are liable to the users once they try and access with proper authentication. The proposed system provides systematic access policy schemes and creates the access mechanism to remote users. These policies and mechanisms are entirely supported context info. The user should satisfy the defined context and defined the user level. This mechanism provides the facilities to users to request and access control through SMS.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here