Look who's talking: authenticating service access points

  • Authors:
  • Adolf Hohl;Lutz Lowis;Alf Zugenmaier

  • Affiliations:
  • Institute of Computer Science and Social Studies, University of Freiburg, Freiburg, Germany;Institute of Computer Science and Social Studies, University of Freiburg, Freiburg, Germany;Microsoft Research Cambridge

  • Venue:
  • SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. These concerns would be unnecessary if the behavior of services in the smart environment could be authenticated and known to be compliant to given policies. Based upon the Trusted Computing idea, we present a solution to the specific problem of service access point authentication. In contrast to previous approaches, this operating system centric approach does not only handle trusted computing enhanced applications but also deals with legacy applications providing services.