Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Securing nomads: the case for quarantine, examination, and decontamination
Proceedings of the 2003 workshop on New security paradigms
Information systems security engineering: a critical component of the systems engineering lifecycle
Proceedings of the 2004 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Personal and Ubiquitous Computing: Issue on privacy and security
Personal and Ubiquitous Computing
RFID: Applications, Security, and Privacy
RFID: Applications, Security, and Privacy
Information exposure control through data manipulation for ubiquitous computing
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Security quality requirements engineering (SQUARE) methodology
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Patterns: service-oriented architecture and web services
Patterns: service-oriented architecture and web services
Hi-index | 0.00 |
The goal of this paper is to provide a framework for ensuring security in ubiquitous computing environment based on security engineering approach. Security engineering is about building systems to remain dependable in the face of malice, error or mischance. In order to do this, we propose a framework which includes the concept of security state and security flow. The combinations of security state and security flow represent a unique viewpoint and a particular pattern for consideration of security services. We can analyze and identify security issues and threats from these combinations and patterns and provide suitable security services for concerns. For this purpose, we have applied our approach to RFID service network, which is one of the representative examples that are to practically realize ubiquitous computing environment.