Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
A Middleware Infrastructure for Active Spaces
IEEE Pervasive Computing
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
ICDCSW '02 Proceedings of the 22nd International Conference on Distributed Computing Systems
Secure smart homes using Jini and UIUC SESAME
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Personal Servers as Digital Keys
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Human-centric network security management: a comprehensive helper
WMASH '06 Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
Hi-index | 0.00 |
In an ubiquitous computing environment, principals can use at any time different devices (displays, input devices, workstations, laptops, mobile phones, PDAs etc.) interconnected by different kinds of networks (Ethernet, Wi-Fi, IrDA, Bluetooth etc.). Some time later, these devices can be off line or disconnected. Principals, as well as devices, come and go. In this scenario, a lightweight security scheme is necessary to add authentication, secrecy and integrity without depending on connections to centralized services. This scheme must support disconnection and delegation. Also, it has to be easy to use and to deploy. Neither classic security schemes that are used in common open network systems nor security schemes proposed for ubiquitous environments comply with some of these requirements. In this paper we propose SHAD, a human centered security scheme designed for a new operating system named Plan B. SHAD avoids the use of centralized entities and it is designed to be agile in a Peer-to-Peer environment.