Advertisement

Approaches for Ensuring Security and Privacy in Unplanned Ubiquitous Computing Interactions

  • V. Ramakrishna
  • Kevin Eustice
  • Matthew Schnaider

Keywords

Mobile Device Security Policy Ubiquitous Computing Trust Management Pervasive Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Balfanz D, Smetters DK, Stewart P, Wong HC (2002) Talking to Strangers: Authentication in Ad-Hoc Wireless Networks. In: Proceedings of the 9th Network and Distributed System Security Symposium, San Diego, California, The Internet Society, pp 23–25Google Scholar
  2. 2.
    Balfanz D, Durfee G, Grinter R, Smetters DK, Stewart P (2004) Network-in-a-Box: How to Set Up a Secure Wireless Network in Under a Minute. In: Proceedings of the 13th Usenix Security Symposium, San Diego, California, pp 207–222Google Scholar
  3. 3.
    Blaze M (1993) A cryptographic file system for UNIX. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, ACM Press, New York, New York, pp 9–16Google Scholar
  4. 4.
    Blaze M, Feigenbaum J, Strauss M (1998) Compliance Checking in the PolicyMaker Trust Management System. In: Proceedings of the Financial Cryptography Conference, Lecture Notes in Computer Science, vol 1465. Springer-Verlag, London, UK, pp 254–274Google Scholar
  5. 5.
    Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD (1999) RFC 2704 - The KeyNote Trust Management System Version 2. RFC 2704, Network Working GroupGoogle Scholar
  6. 6.
    Borisov N, Goldberg I, Wagner D (2001) Intercepting Mobile Communications: the Insecurity of 802.11. In: Proceedings of the 7th annual International Conference on Mobile computing and networking, Rome, Italy, pp 180–189Google Scholar
  7. 7.
    Brooks R (1997) The Intelligent Room Project. In: Proceedings of the 2nd International Cognitive Technology Conference, Aizu, JapanGoogle Scholar
  8. 8.
    Cahill V, Gray E, Seigneur J, Jensen CD, Chen Y, Shand B, Dimmock N, Twigg A, Bacon J, English C, Wagealla W, Terzis S, Nixon P, di Marzo Serugendo G, Bryce C, Carbone M, Krukow K, Nielsen M (2003) Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing Journal, vol 2, no. 3, pp 52–61CrossRefGoogle Scholar
  9. 9.
    Cisco Systems (2003) Network Admission Control Executive Positioning Document. White Paper—Cisco Network Admission Control, http://www.cisco.com/en/US/netsol/ns466/networking_solutions_white_paper0900aecd800fdd66.shtmlGoogle Scholar
  10. 10.
    Corner M, Noble B (2002) Zero-Interaction Authentication. In: Proceedings of the 8th annual International Conference on Mobile Computing and Networking (MobiCom), Atlanta, Georgia, pp 1–11Google Scholar
  11. 11.
    Ellison C, Frantz B, Lampson B, Rivest R, Thomas B, Ylonen T (1999) RFC 2693 - SPKI Certificate Theory. RFC 2693, Network Working GroupGoogle Scholar
  12. 12.
    English C, Nixon P, Terzis S, McGettrick A, Lowe H (2002) Dynamic Trust Models for Ubiquitous Computing Environments. In: Proceedings of the First Workshop on Security in Ubiquitous Computing at the Fourth annual International Conference on Ubiquitous Computing, Göteborg, SwedenGoogle Scholar
  13. 13.
    English C, Terzis S, Nixon P (2004) Towards Self-Protecting Ubiquitous Systems: Monitoring Trust-based Interactions. Personal and Ubiquitous Computing Journal, vol 10, issue 1 (December 2005), Springer London, pp 50–54Google Scholar
  14. 14.
    Eustice K, Kleinrock L, Markstrum S, Popek G, Ramakrishna V, Reiher P (2003) Enabling Secure Ubiquitous Interactions. In: Proceedings of the 1st International Workshop on Middleware for Pervasive and Ad-Hoc Computing at the 4th ACM/IFIP/USENIX International Middleware Conference, Rio de Janeiro, BrazilGoogle Scholar
  15. 15.
    Eustice K, Kleinrock L, Markstrum S, Popek G, Ramakrishna V, Reiher P (2003) Securing WiFi Nomads: The Case for Quarantine, Examination, and Decontamination. In: Hempelmann C, Raskin V (eds) Proceedings of the New Security Paradigms Workshop, Sponsored by Applied Computer Security Associates, Ascona, Switzerland, pp 123–128Google Scholar
  16. 16.
    Freudenthal E, Pesin T, Port L, Keenan E, Karamcheti V (2002) dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, IEEE Computer Society, Vienna, Austria, pp 411–420Google Scholar
  17. 17.
    Gavriloaie R, Nejdl W, Olmedilla D, Seamons K, Winslett M (2004) No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. In: Proceedings of the 1st First European Semantic Web Symposium, Heraklion, Greece, Springer-Verlag, pp 342–356Google Scholar
  18. 18.
    Goodrich M, Sirivianos M, Solis J, Tsudik G, Uzun E (2005) Loud and Clear: Human-Verifiable Authentication Based on Audio. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, p 10Google Scholar
  19. 19.
    Jøsang A (1999) Trust-Based Decision Making for Electronic Transactions. In: Proceedings of the Fourth Nordic Workshop on Secure IT Systems, Stockholm, Sweden, Stockholm University Report, pp 99–105Google Scholar
  20. 20.
    Kagal L, Korolev V, Chen H, Joshi A, Finin T (2001) Centaurus: A Framework for Intelligent Services in a Mobile Environment. In: Proceedings of the International Workshop on Smart Appliances and Wearable Computing at the 21st International Conference on Distributed Computing Systems, Mesa, Arizona, pp 195–201Google Scholar
  21. 21.
    Kagal L, Finin T, Joshi A (2001) Trust-Based Security in Pervasive Computing Environments. IEEE Computer Journal, vol 34, no. 12 (December 2001), pp 154–157Google Scholar
  22. 22.
    Kagal L, Undercoffer J, Perich F, Joshi A, Finin T (2002) A Security Architecture Based on Trust Management for Pervasive Computing Systems. In: Proceedings of Grace Hopper Celebration of Women in ComputingGoogle Scholar
  23. 23.
    Kopytoff V, Kim R (2005) Google offers S.F. Wi-Fi—for free / Company’s bid is one of many in response to mayor’s call for universal online access. Article: San Francisco Chronicle, http://www.sfgate.com/cgi-bin/article.cgi?file=/ c/a/2005/10/01/MNGG9F16KG1.DTL, October 1, 2005Google Scholar
  24. 24.
    McCune JM, Perrig A, Reiter MK (2005) Seeing is Believing: Using Camera Phones for Human-Verifiable Authentication. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, pp 110–124Google Scholar
  25. 25.
    Necula G (1997) Proof-Carrying Code. In: Proceedings of the 24th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Paris, France, pp 106–119Google Scholar
  26. 26.
    Nejdl W, Olmedilla D, Winslett M (2004) PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. In: Jonker W, Petkovic, M (eds) Proceedings of the VLDB 2004 International Workshop on Secure Data Management in a Connected World, Lecture Notes in Computer Science, vol 3178, pp 118–132Google Scholar
  27. 27.
    Román M, Hess C, Cerqueira R, Ranganathan A, Campbell R, Nahrstedt K (2002) A Middleware Infrastructure for Active Spaces. IEEE Pervasive Computing Journal, vol 1, issue 4 (October 2002), pp 74–83CrossRefGoogle Scholar
  28. 28.
    Sen, S, Sajja N (2002) Robustness of Reputation-Based Trust: Boolean Case. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: part 1, Bologna, Italy, International Conference on Autonomous Agents, pp 288–293Google Scholar
  29. 29.
    Shankar N, Arbaugh WA (2002) On Trust for Ubiquitous Computing. In: Proceedings of the First Workshop on Security in Ubiquitous Computing at the Fourth annual International Conference on Ubiquitous Computing, Göteborg, SwedenGoogle Scholar
  30. 30.
    Smetters DK, Balfanz D, Durfee G, Smith TF, Lee KH (2006) Instant Matchmaking: Simple and Secure Integrated Ubiquitous Computing Environments. In: Dourish P, Friday A (eds) Proceedings of the 8th annual International Conference on Ubiquitous Computing, Orange County, California, Springer, pp 477–494Google Scholar
  31. 31.
    Stajano F, Anderson R (1999) The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Proceedings of the 7th International Workshop on Security Protocols, Lecture Notes in Computer Science, vol 1796, Cambridge, UK, pp 172–194Google Scholar
  32. 32.
    Waldo J (1999) The Jini Architecture for Network-Centric Computing. Communications of the ACM Journal, vol 42, no. 7 (July 1999), pp 76–82CrossRefGoogle Scholar
  33. 33.
    Weiser M (1991) The Computer for the 21st Century. Scientific American Magazine, vol 265, no. (September 1991), pp. 94–104Google Scholar
  34. 34.
    Winslett M (2003) An Introduction to Trust Negotiation. In: Proceedings of the 1st International Conference on Trust Management, Heraklion, Greece, Lecture Notes in Computer Science, vol 2692, pp 275–283Google Scholar
  35. 35.
    Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L (2002) Negotiating Trust on the Web. IEEE Internet Computing Journal, vol 6, issue 6 (November 2002), pp 30–37CrossRefGoogle Scholar
  36. 36.
    Wright CP, Martino M, Zadok E (2003) NCryptfs: A Secure and Convenient Cryptographic File System. In: Proceedings of the USENIX 2003 Annual Technical Conference, pp 197–210Google Scholar
  37. 37.
    Xiong L, Liu L (2004) PeerTrust: Supporting Reputation-Based Trust in Peer-to-Peer Electronic Communities. In: IEEE Transactions on Knowledge and Data Engineering, vol 16, no. 7 (July 2004), pp 843–857CrossRefGoogle Scholar
  38. 38.
    Zhu F, Zhu W, Mutka MW, Ni LM (2005) Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, Kauai Island, Hawaii, pp 225–234Google Scholar
  39. 39.
    Zimmermann PR (1995) The Official PGP User’s Guide. The MIT Press, Cambridge, MassachusettsGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • V. Ramakrishna
    • 1
  • Kevin Eustice
    • 1
  • Matthew Schnaider
    • 1
  1. 1.Laboratory for Advanced Systems Research Computer Science DepartmentUniversity of California Los Angeles

Personalised recommendations