Professional Documents
Culture Documents
ANKITA CHAMBYAL
ROLL NO:- 1005/09
M.C.A. III rd sem.
CONTENTS
INTRODUCTION
ARCHITECTURE
SECURITY ASSUMPTIONS
VIRTUAL WALL MODEL
VIRTUAL WALL INTERACTION
LIMITATION OF THE MODEL
FUTURE WORK
CONCLUSION
REFERENCES
INTRODUCTIO
N
PERVASIVE ENVIRONMENT
Pervasive computing is a rapidly developing area of
Information and Communications Technology (ICT).
Pervasive computing involves three converging areas of
ICT:
Computing (‘devices’),
Communication (‘connectivity’) and
User interfaces.
VIRTUAL WALL
TRANSPARENT
OPAQUE
TRANSLUCENT
TRANSPARENT VIRTUAL WALL
Alice and Bob are aware of their physical privacy within the
meeting room, but sensors are leaking personal footprints to
the pervasive environment.
TRANSLUCENT VIRTUAL WALL
Sensor security.
VIRTUAL WALL MODEL
PLACES
FOOTPRINTS
QUERIES
VIRTUAL WALL
VIRTUAL WALL INTERACTION
Two virtual walls conflict if there exists a queries
for whom two or more different transparencies
apply for access to a particular digital footprint.