SHAD: a human centered security architecture for partitionable, dynamic and heterogeneous distributed systems

  • Authors:
  • Enrique Soriano Salvador

  • Affiliations:
  • Universidad Rey Juan Carlos, Móstoles (Madrid), Spain

  • Venue:
  • DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In an ubiquitous computing environment, principals can use at any time different devices (displays, input devices, workstations, laptops, mobile phones, PDAs etc.) interconnected by different kinds of networks (Ethernet, Wi-Fi, IrDA, Bluetooth etc.). Some time later, these devices can be off line or disconnected. Principals, as well as devices, come and go. In this scenario, a lightweight security scheme is necessary to add authentication, secrecy and integrity without depending on connections to centralized services. This scheme must support disconnection and delegation. Also, it has to be easy to use and to deploy. Neither classic security schemes that are used in common open network systems nor security schemes proposed for ubiquitous environments comply with some of these requirements. In this paper we propose SHAD, a human centered security scheme designed for a new operating system named Plan B. SHAD avoids the use of centralized entities and it is designed to be agile in a Peer-to-Peer environment.