Role-Based Access Control Models
Computer
Security: for ubiquitous computing
Security: for ubiquitous computing
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
Integrating Flexible Support for Security Policies into the Linux Operating System
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Access Control for Active Spaces
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Routing Through the Mist: Privacy Preserving Communication in Ubiquitous Computing Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
GaiaOS: An Infrastructure for Active Spaces
GaiaOS: An Infrastructure for Active Spaces
Developing Dynamic Security Policies
DANCE '02 Proceedings of the 2002 DARPA Active Networks Conference and Exposition
Reflective Middleware: From Your Desk to Your Hand
IEEE Distributed Systems Online
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Intelligent Agents Meet Semantic Web in a Smart Meeting Room
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 2
On modeling for pervasive computing environments
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Privacy and community connectedness: designing intelligent environments for our cities
OZCHI '07 Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces
Context-aware role-based access control in pervasive computing systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
Secure Mobile Device Use in Healthcare Guidance from HIPAA and ISO17799
Information Systems Management
Shadow attacks on users' anonymity in pervasive computing environments
Pervasive and Mobile Computing
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Journal of Systems and Software
Ninja: non identity based, privacy preserving authentication for ubiquitous environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
A trust management scheme for enhancing security in pervasive wireless networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Dynamic privacy management in pervasive sensor networks
AmI'10 Proceedings of the First international joint conference on Ambient intelligence
Evaluating user-centered privacy model (UPM) in pervasive computing systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Pseudonymous PKI for ubiquitous computing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Secure identity management for pseudo-anonymous service access
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
mCrypton – a lightweight block cipher for security of low-cost RFID tags and sensors
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Securing publish/subscribe for multi-domain systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Understanding identity exposure in pervasive computing environments
Pervasive and Mobile Computing
Formalising security in ubiquitous and cloud scenarios
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Making family care work: dependence, privacy and remote home monitoring telecare systems
Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing
Trust-based authentication scheme with user rating for low-resource devices in smart environments
Personal and Ubiquitous Computing
The Journal of Supercomputing
Hi-index | 0.02 |
Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work.