The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environm...
Even more than in our physical world, in our digital world we need systems that meet the security objective of service providers and users in equal measure. This paper investigates...