Security requirements in service oriented architectures for ubiquitous computing

This work presents a detailed analysis of the security requirements for Service Oriented Architecture in mobile computing, still missing in the current literature. The purpose of this work is twofold. First, to provide protocol architects and software engineers with a map of security requirements in ubiquitous computing, through the evaluation of existing protocols and architectures. Second, to highlight architectural issues, including technologies and trade offs, in the design and implementation of a secure service oriented architecture for ubiquitous computing.

[1]  Srinivas Devadas,et al.  Access-controlled resource discovery for pervasive networks , 2003, SAC '03.

[2]  Hari Balakrishnan,et al.  The design and implementation of an intentional naming system , 1999, SOSP.

[3]  Andry Rakotonirainy,et al.  Resource Discovery for Pervasive Environments , 2002, CoopIS/DOA/ODBASE.

[4]  Paddy Nixon,et al.  Dynamic trust models for ubiquitous computing environments , 2002 .

[5]  Zahir Tari,et al.  On the Move to Meaningful Internet Systems. OTM 2018 Conferences , 2018, Lecture Notes in Computer Science.

[6]  Lionel M. Ni,et al.  Splendor: A secure, private, and location-aware service discovery protocol supporting mobile services , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[7]  Daniel A. Menascé,et al.  The performance of public key-enabled kerberos authentication in mobile computing applications , 2001, CCS '01.

[8]  Anand Raghunathan,et al.  Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..

[9]  Srinivas Devadas,et al.  Proxy-based security protocols in networked mobile devices , 2002, SAC '02.

[10]  Ben Y. Zhao,et al.  An Architecture for Secure Wide-Area Service Discovery , 2002, Wirel. Networks.

[11]  Choonhwa Lee,et al.  PROTOCOLS FOR SERVICE DISCOVERY IN DYNAMIC AND MOBILE NETWORKS , 2001 .

[12]  Alan W. Brown,et al.  Using Service-Oriented Architecture and Component-Based Development to Build Web Service Applications , 2003 .

[13]  Tim Kindberg,et al.  An authorization infrastructure for nomadic computing , 2002, SACMAT '02.

[14]  Audun Jøsang,et al.  Security in Mobile Communications: Challenges and Opportunities , 2003, ACSW.

[15]  Timothy W. Finin,et al.  Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments , 2002, Wirel. Networks.