JOURNAL ARTICLE

Towards Data-Centric Security in Ubiquitous Computing Environments

Abstract

The vision of data-centric security promises to enable efficient security in future ubiquitous computing environments, which are heavily pervaded with embedded devices and generally to complex to manage manually. We survey the existing work of various areas needed for data-centric security, point out their relationships, and comment on their applicability in these future environments. Furthermore, we present two concepts that explicitly employ the distinct UbiComp characteristics to foster data-centric security.

Keywords:
Computer science Ubiquitous computing Database-centric architecture Computer security Data security Point (geometry) Data science Human–computer interaction Software

Metrics

1
Cited By
0.00
FWCI (Field Weighted Citation Impact)
29
Refs
0.12
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Advanced Data Storage Technologies
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

BOOK-CHAPTER

Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments

Yitao DuanJohn Canny

Lecture notes in computer science Year: 2005 Pages: 167-185
BOOK-CHAPTER

User-Centric Situation Awareness in Ubiquitous Computing Environments

Gautham PallapaSajal K. Das

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2012 Pages: 543-552
BOOK-CHAPTER

Towards Self-coordinating Ubiquitous Computing Environments

Franz J. Rammig

Lecture notes in computer science Year: 2006 Pages: 2-13
© 2026 ScienceGate Book Chapters — All rights reserved.