Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings

Front Cover
Dieter Hutter, Markus Ullmann
Springer Science & Business Media, Mar 30, 2005 - Computers - 239 pages
This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard, Germany.The objective of this second conference was to develop new security concepts for complex application scenarios based on systems like handhelds, phones, smartcards, RFID-chips andsmartlabelshandinhandwiththeemergingtechnologyofubiquitousandpervasive computing. In particular the conference focused on methods and technologies conce- ing the identi?cation of risks, the de?nition of security policies, and the development of security and privacy measures, especially cryptographic protocols that are related to speci?c aspects of ubiquitous and pervasive computing like mobility, location-based services, adhocnetworking, resourceallocation/restriction, invisibility, andsecureha- ware/software platforms. We received 48 submissions. Each submission was reviewed by three independent reviewers and an electronic Program Committee meeting was held via the Internet. We are very grateful to the Program Committee members for their ef?ciency in processing the work and also for the quality of their reviews and discussions. Finally the Program Committee decided to accept 14 long papers and 3 short papers. Apart from the Program Committee, we would like to thank also the other persons who contributed to the success of this conference: the additional referees for revi- ing the papers, the authors for submitting the papers, and the local organizers, and in particular Hans-Peter Wagner, for the local organization of the conference in Boppard. SPC 2005 was hosted by the Bundesakademie fur ] of ] fentlicheVerwaltung of the Federal Ministry of the Interior, and was sponsored by the DFKI and BSI.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Pervasive Computing A Case for the Precautionary Principle?
1
A Framework for Distributed Smartcards
3
P2P Digital Value Fair Trading System Using Smart Cards
18
A Ubiquitous Healthcare Example
31
Securing Ad Hoc Networks
46
Secure Identity Management for PseudoAnonymous Service Access
48
Security Issues for Pervasive Personalized Communication Systems
56
Outline of a Research Agenda on the European Level
63
EPC Technology
117
Exploiting Empirical Engagement in Authentication Protocol Design
119
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems
134
Access Points
151
Security Issues of Mobile Devices
163
Privacy for Profitable Location Based Services
164
On the Anonymity of Periodic Location Samples
179
A Theorem Proving Approach to Analysis of Secure Information Flow
193

ChallengeResponse Based RFID Authentication Protocol for Distributed Database Environment
70
Security Concept of the EUPassport
85
A Novel Authentication Scheme for Sensor Networks
86
Ephemeral Pairing on Anonymous Networks
101
An Efficient Access Control Model for Mobile AdHoc Communities
210
TrustBased Access Control for Pervasive Devices
225
Author Index
239
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information