Models, protocols, and architectures for secure pervasive computing: challenges and research directions

被引:0
作者
Thomas, RK
Sandhu, R
机构
来源
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS | 2004年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be successful, efforts to build these would have to recognize from the onset that pervasive computing settings are complex socio-technical system and would thus have to go beyond traditional system-centric approaches to analyzing and designing security.
引用
收藏
页码:164 / 168
页数:5
相关论文
共 12 条
  • [1] ALMUHTADI J, 2003, P 1 IEEE C PERV COM
  • [2] ALMUHTADI J, 2002, P INT WORKSH SMART A
  • [3] Protecting applications with transient authentication
    Corner, MD
    Noble, BD
    [J]. PROCEEDINGS OF MOBISYS 2003, 2003, : 57 - 70
  • [4] JAJODIA S, 2001, PROVISIONAL AUTHORIZ
  • [5] LANGHEINRICH M, 2002, LECT NOTES COMPUTER, V2201, P273
  • [6] MICHALAKIS N, PAC LOCATION AWARE A
  • [7] PARK J, 2004, ACM TISSEC FEB
  • [8] Stajano F., 2002, Security for ubiquitous computing
  • [9] THOMAS R, 1997, P IFIP 11 3 WORKSH D
  • [10] THOMAS RK, 1997, P 2 ACM WORKSH ROL B