ACM Transactions on Computer Systems (TOCS)
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
KQML as an agent communication language
Software agents
Personal security agent: KQML-based PKI
AGENTS '98 Proceedings of the second international conference on Autonomous agents
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Using encryption for authentication in large networks of computers
Communications of the ACM
Security infrastructure for software agent society
Trust and deception in virtual societies
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
A Solution to Open Standard of PKI
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Security Weaknesses in Bluetooth
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
A Logical Language for Specifying Cryptographic Protocol Requirements
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
SWAPEROO: a simple wallet architecture for payments, exchanges, refunds, and other operations
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Hi-index | 0.00 |
The security of ubiquitous computing can hardly be achieved by deploying security mechanisms at low level of communication infrastructure. Considering the mobility over heterogeneity of the ubiquitous computing and its federative fashion, our rationale study shows that security mechanism built in the form of agent-based architecture at the bottom of application level is the desirable solution. This paper systematically addresses this solution as follow: firstly a sketch of ubiquitous computing environment is proposed according to a realistic understanding of the technologies and their trends; secondly, the security implementations and implications are discussed; thirdly we extend and apply security reasoning logic on the agent-based solution for which a refined treatment to cryptographic operations is made to accurately associate the formal logic with its concrete instantiations of the protocols being made of the operations; finally we end with a conclusion summarizing our contributions, related work, current status and future research..