Security policies and trust in ubiquitous computing

被引:7
|
作者
Joshi, Anupam [1 ]
Finin, Tim [1 ]
Kagal, Lalana [2 ]
Parker, Jim [1 ]
Patwardhan, Anand [3 ]
机构
[1] Univ Maryland, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
[2] MIT, Comp Sci & Artificial Intelligence Lab, Cambridge, MA 02139 USA
[3] Cougaar Software Inc, Falls Church, VA 22043 USA
关键词
ubiquitous computing; security; policy; trust; privacy;
D O I
10.1098/rsta.2008.0142
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
引用
收藏
页码:3769 / 3780
页数:12
相关论文
共 50 条
  • [31] NEOS: Non-intrusive Edge Observability stack based on Zero Trust security model for Ubiquitous Computing
    Kumar, Abhijit
    Ahmed, Tauseef
    Saini, Konica
    Kumar, Jay
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND COMMUNICATIONS, EDGE, 2023, : 79 - 84
  • [32] Trust Information and Privacy Policies - Enablers for pHealth and Ubiquitous Health
    Ruotsalainen, Pekka
    Blobel, Bernd
    [J]. PHEALTH 2014, 2014, 200 : 133 - 139
  • [33] On safety and security requirements in emerging ubiquitous computing models
    [J]. Simpson, Andrew (Andrew.Simpson@cs.ox.ac.uk), 1600, Oxford University Press (59):
  • [34] Interoperability and security issues of grid services for ubiquitous computing
    Jana, Debasish
    Chaudhuri, Amritava
    Datta, Abhijit
    Bhaumik, Bijan Bihari
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 1113 - 1116
  • [35] Design of a security management middleware in ubiquitous computing environments
    Jiang, Z
    Lee, K
    Kim, S
    Bae, H
    Kim, S
    Kang, S
    [J]. PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 306 - 308
  • [36] Information security management system for SMB in ubiquitous computing
    Chang, H
    Kim, J
    Lim, S
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 707 - 715
  • [37] On Safety and Security Requirements in Emerging Ubiquitous Computing Models
    Osborn, Emma
    Simpson, Andrew
    [J]. COMPUTER JOURNAL, 2016, 59 (04): : 570 - 591
  • [38] The trouble with login: on usability and computer security in ubiquitous computing
    Bardram, Jakob E.
    [J]. PERSONAL AND UBIQUITOUS COMPUTING, 2005, 9 (06) : 357 - 367
  • [39] A security framework for secure home networking in ubiquitous computing
    Lee, Woon-Gu
    Chae, Cheol-Joo
    Kim, Sang-Kuk
    Kang, Mu-Yeong
    Lee, Jae-Kwang
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 394 - 397
  • [40] Special Issue on Security Aspects in Pervasive and Ubiquitous Computing
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2015, 18 (1-2) : 1 - 2