Towards Data-Centric Security in Ubiquitous Computing Environments

被引:1
|
作者
Ransom, Stefan [1 ]
Werner, Christian [1 ]
机构
[1] Univ Lubeck, Inst Telemat, Lubeck, Germany
关键词
D O I
10.1109/DEXA.2009.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The vision of data-centric security promises to enable efficient security in future ubiquitous computing environments, which are heavily pervaded with embedded devices and generally to complex to manage manually. We survey the existing work of various areas needed for data-centric security, point out their relationships, and comment on their applicability in these future environments. Furthermore, we present two concepts that explicitly employ the distinct UbiComp characteristics to foster data-centric security.
引用
收藏
页码:26 / 30
页数:5
相关论文
共 50 条
  • [1] Ubiquitous Data-Centric Sensor Networks
    Yang, Ting
    Woo, Peng-Yung
    Wang, Zhaoxia
    Taheri, Javid
    Choor, Chin Hoong
    Hu, Guoqiang
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [2] Data-Centric Intelligent Computing
    Jun Shen
    Chih-Cheng Hung
    Ghassan Beydoun
    Yan Li
    William Guo
    [J]. International Journal of Computational Intelligence Systems, 2018, 11 : 616 - 617
  • [3] Data-Centric Intelligent Computing
    Shen, Jun
    Hung, Chih-Cheng
    Beydoun, Ghassan
    Li, Yan
    Guo, William
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2018, 11 (01) : 616 - 617
  • [4] Data-Centric Security for the IoT
    Schreckling, Daniel
    Parra, Juan David
    Doukas, Charalampos
    Posegga, Joachim
    [J]. INTERNET OF THINGS: IOT INFRASTRUCTURES, IOT 360, PT II, 2016, 170 : 77 - 86
  • [5] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [6] A data-centric security analysis of ICGrid
    Luna, Jesus
    Flouris, Michail
    Marazakis, Manolis
    Bilas, Angelos
    [J]. GRID COMPUTING: ACHIEVEMENTS AND PROSPECTS, 2008, : 197 - 208
  • [7] Data Subsetting: A Data-Centric Approach to Approximate Computing
    Kim, Younghoon
    Venkataramani, Swagath
    Chandrachoodan, Nitin
    Raghunathan, Anand
    [J]. 2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 576 - 581
  • [8] Protecting user data in ubiquitous computing: Towards trustworthy environments
    Duan, Y
    Canny, J
    [J]. PRIVACY ENHANCING TECHNOLOGIES, 2005, 3424 : 167 - 185
  • [9] Towards using data aggregation techniques in ubiquitous computing environments
    Rasheed, F
    Lee, YK
    Lee, S
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 369 - +
  • [10] DBGlobe: A data-centric approach to global computing
    Karakasidis, A
    Pitoura, E
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 735 - 740