ACM Transactions on Computer Systems (TOCS)
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The design and implementation of an intentional naming system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Summary cache: a scalable wide-area web cache sharing protocol
IEEE/ACM Transactions on Networking (TON)
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Personal Server: Changing the Way We Think about Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
INS/Twine: A Scalable Peer-to-Peer Architecture for Intentional Resource Discovery
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Service Discovery in Pervasive Computing Environments
IEEE Pervasive Computing
Service Discovery in Pervasive Computing Environments
IEEE Pervasive Computing
Private and Secure Service Discovery via Progressive and Probabilistic Exposure
IEEE Transactions on Parallel and Distributed Systems
A trustworthy framework for impromptu service discovery with mobile devices
Mobility '07 Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology
A mobile device management framework for secure service delivery
Information Security Tech. Report
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Enabling secure service discovery in mobile healthcare enterprise networks
IEEE Wireless Communications - Special issue title on applications and support technical for mobility and enterprise services
Flexible and secure service discovery in ubiquitous computing
Journal of Network and Computer Applications
Ninja: non identity based, privacy preserving authentication for ubiquitous environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
User-centric mobile services: context provisioning and user profiling
Proceedings of the 11th Annual International Digital Government Research Conference on Public Administration Online: Challenges and Opportunities
Toward secure and private service discovery anywhere anytime
Frontiers of Computer Science in China
A privacy-preserving secure service discovery protocol for ubiquitous computing environments
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Secure and Private Service Discovery in Pervasive Computing Environments
International Journal of Advanced Pervasive and Ubiquitous Computing
Location-aware private service discovery in pervasive computing environment
Information Sciences: an International Journal
Middleware for pervasive computing: A survey
Pervasive and Mobile Computing
Hi-index | 0.00 |
Service Discovery as an essential element in pervasive computing environments is widely accepted. Much research on service discovery has been conducted, but privacy and security have been ignored and may be sacrificed. While it is essential that legitimate users should be able to discover services, it is also necessary that services be hidden from illegitimate users. Since service information, service provider's information, service requests, user presence information, and user's identities may be sensitive, we may want to keep them private during service discovery processes. There appears to be no existing service discovery protocols that solve these problems. We present a user-centric model, called PrudentExposure, which exposes minimal information privately and securely. Users and service owners exchange code words in an efficient and scalable form to establish mutual trust. Based on the trust, secure service discovery sessions are set up. The model is further improved to counter attacks. We analyze the mathematical properties of our model, formally verify our security protocol, and measure the performance of our prototype system.