Security policies and trust in ubiquitous computing

被引:7
|
作者
Joshi, Anupam [1 ]
Finin, Tim [1 ]
Kagal, Lalana [2 ]
Parker, Jim [1 ]
Patwardhan, Anand [3 ]
机构
[1] Univ Maryland, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
[2] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
[3] Cougaar Software Inc, Falls Church, VA 22043 USA
关键词
ubiquitous computing; security; policy; trust; privacy;
D O I
10.1098/rsta.2008.0142
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
引用
收藏
页码:3769 / 3780
页数:12
相关论文
共 50 条
  • [1] Trust-based security architecture for Ubiquitous Computing systems
    Hung, Le Xuan
    Giang, Pho Duc
    Zhung, Yonil
    Van Phuong, Tran
    Lee, Sungyoung
    Lee, Young-Koo
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 753 - 754
  • [2] A trust-based security system for ubiquitous and pervasive computing environments
    Boukerche, Azzedine
    Ren, Yonglin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4343 - 4351
  • [3] Trust models in ubiquitous computing
    Krukow, Karl
    Nielsen, Mogens
    Sassone, Vladimiro
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2008, 366 (1881): : 3781 - 3793
  • [4] Security and trust in ubiquitous systems
    Samia Bouzefrane
    Jenny Gabriela Torres Olmedo
    Gongxuan Zhang
    Nicolas Puech
    [J]. Annals of Telecommunications, 2021, 76 : 117 - 118
  • [5] Security and trust in ubiquitous systems
    Bouzefrane, Samia
    Torres Olmedo, Jenny Gabriela
    Zhang, Gongxuan
    Puech, Nicolas
    [J]. ANNALS OF TELECOMMUNICATIONS, 2021, 76 (3-4) : 117 - 118
  • [6] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [7] Survey of Ubiquitous Computing Security
    Li, Yin
    Chen, Yong
    Zhao, Jingxin
    Yue, Xinghui
    Zheng, Chen
    Wu, Yanjun
    Wu, Gaofei
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (05): : 1054 - 1081
  • [8] The security challenges of ubiquitous computing
    Stajano, F
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 1 - 1
  • [9] Special issue on security in ubiquitous computing
    Qu, Wenyu
    Xiang, Yang
    Zhang, Yong
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1221 - 1222
  • [10] Small worlds and the security of ubiquitous computing
    Vogt, H
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, : 593 - 597