Security Policies and Trust in Ubiquitous Computing

Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
Date: July 31, 2008
Book Title: Philosophical Transactions of the Royal Society
Type: Article
Publisher: Royal Society Publishing
Downloads: 676

Has 1 soft copy


size 33288 bytes

Bibtex


@Article{Security_Policies_and_Trust_in_Ubiquitou,
  author = "Anupam Joshi and Tim Finin and Lalana Kagal and Jim Parker and Anand Patwardhan",
  title = "{Security Policies and Trust in Ubiquitous Computing}",
  month = "July",
  year = "2008",
  journal = "Philosophical Transactions of the Royal Society",
  publisher = "Royal Society Publishing",
}