Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1765533.1765536guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Security for whom? the shifting security assumptions of pervasive computing

Published: 08 November 2002 Publication History

Abstract

Pervasive computing will introduce hundreds of computing devices per user. This change is of such magnitude that it is qualitative as well as quantitative. Old solutions may not scale when the size of the problem grows by such a factor-passwords, for example, will no longer be a suitable user authentication method.
In this paper we examine new security issues for pervasive computing including authentication, biometrics and digital rights management. But the potential impact of pervasive computing on society is such that we have a responsibility to look further than just the technical issues.

References

[1]
Mark Weiser. "The Computer for the Twenty-First Century". Scientific American, 265(3): 94-104, Sep 1991. http://www.ubiq.com/hypertext/weiser/SciAmDraft3. html.
[2]
Frank Stajano. Security for Ubiquitous Computing. John Wiley and Sons, Feb 2002. ISBN 0-470-84493-0. http://www-lce.eng.cam.ac.uk/fms27/secubicomp/.
[3]
Ross Anderson, Frank Stajano and Jong-Hyeon Lee. "Security Policies". In Marvin V. Zelkowitz (ed.), "(untitled)", vol. 55 of Advances in Computers, pp. 185-235. Academic Press, 2001. ISBN 0-12-012155-7.
[4]
Ross Anderson and Markus Kuhn. "Tamper Resistance-A Cautionary Note". In "Proc. 2nd USENIX Workshop on Electronic Commerce", 1996. ISBN 1-880446- 83-9. http://www.cl.cam.ac.uk/~mgk25/tamper. pdf.
[5]
Oliver Kömmerling and Markus G. Kuhn. "Design Principles for Tamper-Resistant Smartcard Processors". In "Proceedings of the USENIX Workshop on Smartcard Technology (Smartcard '99)", pp. 9-20. USENIX Association, Chicago, IL, 10- 11 May 1999. ISBN 1-880446-34-0. http://www.cl.cam.ac.uk/~mgk25/sc99-tamper.pdf.
[6]
Michael Roe. Cryptography and Evidence. Ph.D. thesis, University of Cambridge, 1997. http://www.research.microsoft.com/users/mroe/THESIS. PDF.
[7]
Ross Anderson. Security Engineering-A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2001. ISBN 0-471-38922-6.
[8]
Lisa Thalheim, Jan Krissler and Peter-Michael Ziegler. "Body Check: Biometric Access Protection Devices and their Programs Put to the Test". c't, 11: 114ff., 22 May 2002. http://www.heise.de/ct/english/02/11/114/. Originally in German, but translated into English at the URL provided.
[9]
John Gilmore. "What's Wrong With Copy Protection", 16 Feb 2001. http://www.toad.com/gnu/whatswrong.html. Originally posted to the mailing list cryptography@c2. net on 2001-01-18 in response to an invitation by Ron Rivest.
[10]
Ross Anderson. "TCPA / Palladium Frequently Asked Questions, Version 1. 0", Jul 2002. http://www.cl.cam.ac.uk/users/rja14/tcpa-faq. html.
[11]
Richard Stallman. "Can you trust your computer?", 21 Oct 2002. http://newsforge.com/newsforge/02/10/21/1449250. shtml?tid=19. Also archived at http://www.gnu.org/philosophy/can-you-trust. html.
[12]
Philip R. Zimmermann. "Testimony of Philip R. Zimmermann to the Subcommittee on Science, Technology, and Space of the US Senate Committee on Commerce, Science, and Transportation", 26 Jun 1996. http://www.cdt.org/crypto/current legis/960626 Zimm test. html.
[13]
Roy Want, Andy Hopper, Veronica Falcão and Jonathan Gibbons. "The Active Badge Location System". ACM Transactions on Information Systems, 10(1): 91- 102, Jan 1992. ftp://ftp.uk.research.att.com/pub/docs/att/tr. 92. 1. pdf. Also available as AT&T Laboratories Cambridge Technical Report 92. 1.
[14]
Andy Ward, Alan Jones and Andy Hopper. "A New Location Technique for the Active Office". IEEE Personal Communications, 4(5): 42-47, Oct 1997. ftp://ftp.uk.research.att.com/pub/docs/att/tr. 97. 10. pdf. Also available as AT&T Laboratories Cambridge Technical Report 97. 10.
[15]
Alastair Beresford and Frank Stajano. "Location Privacy in Pervasive Computing", 2003. Accepted by IEEE Pervasive Computing. To appear.

Cited By

View all
  • (2008)Human-in-the-loopCHI '08 Extended Abstracts on Human Factors in Computing Systems10.1145/1358628.1358810(3075-3080)Online publication date: 5-Apr-2008
  • (2006)Re-identifying anonymous nodesProceedings of the Second international conference on Location- and Context-Awareness10.1007/11752967_8(103-115)Online publication date: 10-May-2006
  • (2004)Co-Operation in the Digital Age — Engendering Trust in Electronic EnvironmentsBT Technology Journal10.1023/B:BTTJ.0000047124.46203.fc22:3(95-105)Online publication date: 1-Jul-2004
  1. Security for whom? the shifting security assumptions of pervasive computing

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        ISSS'02: Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
        November 2002
        470 pages
        ISBN:3540007083

        Sponsors

        • NSF: National Science Foundation
        • JSPS: Japanese Society for the Promotion of Science
        • Keio University: Keio University
        • MEXT: Japanese Ministry of Education, Science and Culture

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 08 November 2002

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 26 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2008)Human-in-the-loopCHI '08 Extended Abstracts on Human Factors in Computing Systems10.1145/1358628.1358810(3075-3080)Online publication date: 5-Apr-2008
        • (2006)Re-identifying anonymous nodesProceedings of the Second international conference on Location- and Context-Awareness10.1007/11752967_8(103-115)Online publication date: 10-May-2006
        • (2004)Co-Operation in the Digital Age — Engendering Trust in Electronic EnvironmentsBT Technology Journal10.1023/B:BTTJ.0000047124.46203.fc22:3(95-105)Online publication date: 1-Jul-2004

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media