Security in Pervasive Computing Calling for new Security Principles

In this paper we elaborate on the challenges that come with pervasive computing for providing security that enables users to explore the new dimension of computing and communications and do not hinder them. The paper is structured as follows: We first sketch an ideal state which we believe is desirable to achieve. We argue that, in fact, the continuation of current security practices is not possible. We then show how we could achieve this ideal state in which security is not achieved by prohibiting everything not explicitly allowed, but by monitoring, evidence gathering and reconciliation.

[1]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[2]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[3]  Adolf Hohl,et al.  Safeguarding Personal Data using Rights Management in Distributed Applications , 2007, SEC.

[4]  Christian Schaefer,et al.  A Security-by-Contract Architecture for Pervasive Services , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[5]  Christian Schaefer,et al.  Monitors for Usage Control , 2007, IFIPTM.

[6]  Carl M. Ellison,et al.  The nature of a useable PKI , 1999, Comput. Networks.

[7]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .