Ubiquitous security for ubiquitous computing

  • Authors:
  • Zia Hayat;Jeff Reeve;Chris Boutle

  • Affiliations:
  • University of Southampton, United Kingdom;University of Southampton, United Kingdom;BAE Systems

  • Venue:
  • Information Security Tech. Report
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The potential for rapid and diverse interconnectivity through devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However, this has resulted in equally ubiquitous security risks due principally to the number and complexity of services being run over such networks. As technology advances towards the realisation of a ubiquitous computing environment, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence, future information security requirements, particularly in light of always-on business processes which require real-time information sharing? This paper describes research conducted into answering these questions. Emphasis is placed on the need for risk management, and how this may be achieved through context-based access control mechanisms and pro-active threat assessment techniques.