Privacy and Anonymity in Personal Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Data security in location-aware applications: an approach based on RBAC
International Journal of Information and Computer Security
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Information seesaw: availability vs. security management in the UbiComp world
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Pseudonymous PKI for ubiquitous computing
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Context-Aware provisional access control
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Challenging issues of UCON in modern computing environments
Proceedings of the Fifth Balkan Conference in Informatics
Security Challenges and Selected Legal Aspects for Wearable Computing
Journal of Information Technology Research
Hi-index | 0.00 |
We explore the challenges and research directions inbuilding models, protocols and architectures to supportsecurity in pervasive computing environments. We arguethat to be successful, efforts to build these would have torecognize from the onset that pervasive computingsettings are complex socio-technical system and wouldthus have to go beyond traditional system-centricapproaches to analyzing and designing security.