Research directions for trust and security in human-centric computing

被引:0
作者
Creese, S
Goldsmith, M
Roscoe, B
Zakiuddin, I
机构
来源
PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING | 2005年 / 780卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive networks foresee communicating and computing devices embedded throughout our environment. This will cause huge increases in the complexity of network infrastructures and the information services available over them. The challenge of managing information services, while maintaining security and privacy will be great. It is not clear that current security paradigms will map readily into such future environments. This paper outlines the authors' current position regarding the technical challenges which will need to be addressed in order to make secure pervasive computing environments a reality.
引用
收藏
页码:83 / 91
页数:9
相关论文
共 5 条
[1]  
BOYD C, 2003, PROTOCOLS AUTHENTICA
[2]  
CREESE S, 2003, FORMAL ASPECTS SECUR
[3]  
CREESE S, 2003, 1 INT C SEC PERV COM, V2802
[4]  
DOLEV D, 1983, IEEE T ACTIONS THEOR, V29
[5]  
Ryan P.Y. A., 2001, MODELLING ANAL SECUR