Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers

Front Cover
Springer Science & Business Media, Jan 26, 2004 - Computers - 289 pages
The ongoing compression of computing facilities into small and mobile devices like handhelds, portables or even wearable computers will enhance ubiquitous information processing. The basic paradigm of such pervasive computing is the combination of strongly decentralized and distributed computing with the help of diversi'ed devices allowingforspontaneousconnectivityviatheInternet.Computerswillbecomeinvisible to the user, and exchangeof informationbetween devices will effectivelybe beyondthe user's control. Assuming a broad usage of more powerful tools and more effective ways to use them the quality of everydaylife will be strongly in'uenced by the dependabilityof the new technology. Information stored, processed, and transmitted by the various devices is one of the most critical resources. Threats exploiting vulnerabilities of new kinds of user interfaces, displays, operating systems, networks, and wireless communications will cause new risks of losing con'dentiality, integrity, and availability. Can these risks be reducedbycountermeasuresto an acceptablelevelor dowe haveto rede'nepolitical and social demands. The objective of this 1st International Conference on Security in Pervasive C- puting was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, and smart labels hand in hand with the emerging technology of ubiquitous and pervasive computing. Particular subjects were methodsand technologyconcerningthe identi'cationof risks, the de'nition of security policies, and the development of security measures that are related to the speci'c - pects of ubiquitous and pervasive computing like mobility, communication, and secure hardware/software platforms.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The Age of Pervasive Computing Everything Smart Everything Connected? Abstract of Invited Talk
1
Cyber Assist Project and Its Security Requirement Abstract of Invited Talk
2
Security in Pervasive Computing Abstract of Invited Talk
6
The Importance of High Assurance Security in Pervasive Computing Abstract of Invited Talk
9
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks
10
Protecting Access to People Location Information
25
The Basics of Good Behaviour
39
Dependability Issues of Pervasive Computing in a Healthcare Environment
53
Embedding DistanceBounding Protocols within Intuitive Interactions
143
An Infrastructure for Pervasive Security in ContextAware Environments
157
Time Constraint Delegation for P2P Data Decryption
173
A New Efficient Server Assisted Signature Scheme for Pervasive Computing
187
Security and Privacy Aspects of LowCost Radio Frequency Identification Systems
201
Implementing a Formally Verifiable Security Protocol in Java Card
213
Cellular Automata Based Multiplier for PublicKey Cryptosystem
227
Enlisting Hardware Architecture to Thwart Malicious Code Injection
237

Protecting Security Policies in Ubiquitous Environments Using OneWay Functions
71
Enforcing Security Policies via Types
86
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems
101
Authentication for Pervasive Computing
116
EndtoEnd Trust Starts with Recognition
130
Optimized RISC Architecture for MultiplePrecision Modular Arithmetic
253
Visual Crypto Displays Enabling Secure Communications
271
Security and Privacy in Pervasive Computing State of the Art and Future Directions
285
Author Index
290
Copyright

Other editions - View all

Common terms and phrases