A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://doi.org/10.1007/3-540-36532-X_2 below:

Security for Whom? The Shifting Security Assumptions of Pervasive Computing

Abstract

Pervasive computing will introduce hundreds of computing devices per user. This change is of such magnitude that it is qualitative as well as quantitative. Old solutions may not scale when the size of the problem grows by such a factor—passwords, for example, will no longer be a suitable user authentication method.

In this paper we examine new security issues for pervasive computing including authentication, biometrics and digital rights management. But the potential impact of pervasive computing on society is such that we have a responsibility to look further than just the technical issues.

This is a preview of subscription content, log in via an institution to check access.

Preview

Unable to display preview. Download preview PDF.

References
  1. Mark Weiser. “The Computer for the Twenty-First Century”. Scientific American, 265(3):94–104, Sep 1991. http://www.ubiq.com/hypertext/weiser/SciAmDraft3.html.

    Article  Google Scholar 

  2. Frank Stajano. Security for Ubiquitous Computing. John Wiley and Sons, Feb 2002. ISBN 0-470-84493-0. http://www-lce.eng.cam.ac.uk/~fms27/secubicomp/.

  3. Ross Anderson, Frank Stajano and Jong-Hyeon Lee. “Security Policies”. In Marvin V. Zelkowitz (ed.), “(untitled)”, vol. 55 of Advances in Computers, pp. 185–235. Academic Press, 2001. ISBN 0-12-012155-7.

    Google Scholar 

  4. Ross Anderson and Markus Kuhn. “Tamper Resistance-A Cautionary Note”. In “Proc. 2nd USENIX Workshop on Electronic Commerce”, 1996. ISBN 1-880446-83-9. http://www.cl.cam.ac.uk/~mgk25/tamper.pdf.

  5. Oliver Kömmerling and Markus G. Kuhn. “Design Principles for Tamper-Resistant Smartcard Processors”. In “Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard’ 99)”, pp. 9–20. USENIX Association, Chicago, IL, 10–11 May 1999. ISBN 1-880446-34-0. http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf.

  6. Michael Roe. Cryptography and Evidence. Ph.D. thesis, University of Cambridge, 1997. http://www.research.microsoft.com/users/mroe/THESIS.PDF.

  7. Ross Anderson. Security Engineering-A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2001. ISBN 0-471-38922-6.

    Google Scholar 

  8. Lisa Thalheim, Jan Krissler and Peter-Michael Ziegler. “Body Check: Biometric Access Protection Devices and their Programs Put to the Test”. c’t, 11:114.., 22 May 2002. http://www.heise.de/ct/english/02/11/114/. Originally in German, but translated into English at the URL provided.

  9. John Gilmore. “What’s Wrong With Copy Protection”, 16 Feb 2001. http://www.toad.com/gnu/whatswrong.html. Originally posted to the mailing list cryptography@c2.net on 2001-01-18 in response to an invitation by Ron Rivest.

  10. Ross Anderson. “dTCPA / Palladium Frequently Asked Questions, Version 1.0”, Jul 2002. http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html.

  11. Richard Stallman. “Can you trust your computer?”, 21 Oct 2002. http://newsforge.com/newsforge/02/10/21/1449250.shtml?tid=19. Also archived at http://www.gnu.org/philosophy/can-you-trust.html.

  12. Philip R. Zimmermann. “Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation”, 26 Jun 1996. http://www.cdt.org/crypto/current legis/960626 Zimm test.html.

  13. Roy Want, Andy Hopper, Veronica Falcão and Jonathan Gibbons. “The Active Badge Location System”. ACM Transactions on Information Systems, 10(1):91–102, Jan 1992. ftp://ftp.uk.research.att.com/pub/docs/att/tr.92.1.pdf. Also available as AT&T Laboratories Cambridge Technical Report 92.1.

    Article  Google Scholar 

  14. Andy Ward, Alan Jones and Andy Hopper. “A New Location Technique for the Active Office”. IEEE Personal Communications, 4(5):42–47, Oct 1997. ftp://ftp.uk.research.att.com/pub/docs/att/tr.97.10.pdf. Also available as AT&T Laboratories Cambridge Technical Report 97.10.

  15. Alastair Beresford and Frank Stajano. “Location Privacy in Pervasive Computing”, 2003. Accepted by IEEE Pervasive Computing. To appear.

    Google Scholar 

Download references

Author information Authors and Affiliations
  1. University of Cambridge, Cambridge

    Frank Stajano

Editor information Editors and Affiliations
  1. Keio University, 2-15-45 Mita, Minatoku, 108-8345, Tokyo, Japan

    Mitsuhiro Okada

  2. University of Pennsylvania, 200 South 33rd St., 19104, Philadelphia, PA, USA

    Benjamin C. Pierce

  3. University of Pennsylvania, 209 South 33rd St., 19104-6395, Philadelphia, PA, USA

    Andre Scedrov

  4. Keio University, 5322 Endoh, 252-8520, Fujisawa, Japan

    Hideyuki Tokuda

  5. University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, 113, Tokyo, Japan

    Akinori Yonezawa

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper Cite this paper

Stajano, F. (2003). Security for Whom? The Shifting Security Assumptions of Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds) Software Security — Theories and Systems. ISSS 2002. Lecture Notes in Computer Science, vol 2609. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36532-X_2

Download citation

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4