Trustworthy pervasive computing: the hard security problems

We examine five security problems that are barriers to mainstream pervasive computing. These are: device authentication, privacy, trust management, device assurance, recourse, and availability. We argue that the trust, security, and privacy issues inherent in pervasive computing environments present unique challenges that require a fundamental reexamination of how to build large-scale, trustworthy, distributed systems.

[1]  Trinny Woodall,et al.  What Your Clothes Say About You , 2005 .

[2]  Roy H. Campbell,et al.  A flexible, privacy-preserving authentication framework for ubiquitous computing environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[3]  坂倉 省吾,et al.  Technology Review : 抄録雑誌の概要 , 1987 .

[4]  Herbert Burkert,et al.  Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .

[5]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.

[6]  G. DeFriese,et al.  The New York Times , 2020, Publishing for Libraries.

[7]  Yong Chen,et al.  End-to-End Trust Starts with Recognition , 2003, SPC.

[8]  John A. Clark,et al.  Proceedings of the Third international conference on Security in Pervasive Computing , 2006 .

[9]  Alfred Kobsa,et al.  Privacy through pseudonymity in user-adaptive systems , 2003, TOIT.

[10]  Sadie Creese,et al.  Authentication for Pervasive Computing , 2003, SPC.

[11]  L. Belitsky Protecting the privacy of patients' health information. , 2003, The Alabama nurse.

[12]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[13]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[14]  Robert D. McFadden,et al.  No hiding place , 1981 .

[15]  Vincent M. Stanford,et al.  Pervasive Health Care Applications Face Tough Security Challenges , 2002, IEEE Pervasive Comput..

[16]  Jerrold A. Neiminen To Print Or Not To Print. , 1969 .

[17]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[18]  Santosh Chokhani Trusted products evaluation , 1992, CACM.

[19]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[20]  Diana K. Smetters,et al.  Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.

[21]  James A. Landay,et al.  Modeling Privacy Control in Context-Aware Systems , 2002, IEEE Pervasive Comput..