Catálogo de publicaciones - libros

Compartir en
redes sociales


Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings

John A. Clark ; Richard F. Paige ; Fiona A. C. Polack ; Phillip J. Brooke (eds.)

En conferencia: 3º International Conference on Security in Pervasive Computing (SPC) . York, UK . April 18, 2006 - April 21, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; User Interfaces and Human Computer Interaction

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-33376-0

ISBN electrónico

978-3-540-33377-7

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Profiles and Context Awareness for Mobile Users – A Middleware Approach Supporting Personal Security

Gerald Eichler; Matthias O. Will

This paper addresses the need for individualized information anytime and anyplace in contrast to the problem of user’s right to privacy. The creation and application of profiles is characterized. A extensible middleware approach is proposed to combine independent databases on localization and personal profiles in order to identify the right layer to protect privacy. This will enable telecommunication providers to offer common basic services for the development of a wide range of mobile 3^rd party applications.

Palabras clave: Mobile User; User Profile; Location Base Service; Near Field Communication; User Interest.

- Privacy and Security | Pp. 134-148

Privacy Sensitive Location Information Systems in Smart Buildings

Jodie P. Boyer; Kaijun Tan; Carl A. Gunter

Increasing automation of buildings enables rich information streams about the activities of building users to reach networked computer systems. Privacy concerns typically cause this information to be accessible only by building managers and security personnel. However, if appropriate privacy mechanisms can be implemented, then it is possible to deploy location information systems that can contribute to the convenience and efficiency of users. This paper describes a three step approach to privacy-sensitive release of location information collected by building sensors. These steps entail defining an ownership model, defining environment events to be monitored, and creating a sharing model. These steps are described mathematically and then validated through a case study for a system called Janus’s Map which provides a location information system for the card reader, door, and occupancy sensors of a modern smart building.

Palabras clave: Global Position System; System Event; Privacy Policy; Location Privacy; Card Reader.

- Privacy and Security | Pp. 149-164

Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation

Leping Huang; Hiroshi Yamane; Kanta Matsuura; Kaoru Sezaki

In a wireless communication network, it is possible to locate a user and track its trajectory based on its transmission, during communication with access points. This type of tracking leads to the breach of a user’s location privacy. Prior solutions to this problem enhances user’s location privacy at the expense of communication Quality of Service(QoS) degradation. In this paper, we propose silent cascade to enhance a user’ location privacy by trading users’ delay in silent cascade for anonymity. As a result, it avoids the problem of QoS degradation in prior solutions. Furthermore, we abstract silent cascade as a mix-network based formal model, and use this model to evaluate the performance of silent cascade. Study results prove the effectiveness of silent cascade under different types of QoS requirements. Besides, we also derive the optimal configuration of silent cascade to achieves target anonymity within minimum duration of time. and the theoretical upper bound of a silent cascade’s anonymity.

Palabras clave: Mobile Station; Silent Period; Location Privacy; Silent State; Silent Ratio.

- Privacy and Security | Pp. 165-180

Securing Information Gateways with Derivation-Constrained Access Control

Urs Hengartner; Peter Steenkiste

In pervasive computing environments, information gateways derive specific information, such as a person’s location, from raw data provided by a service, such as a videostream offered by a camera. Here, access control to confidential raw data provided by a service becomes difficult when a client does not have access rights to this data. For example, a client might have access to a person’s location information, but not to the videostream from which a gateway derives this information. Simply granting access rights to a gateway will allow an intruder into the gateway to access any raw data that the gateway can access. We present the concept of derivation-constrained access control, which requires a gateway to prove to a service that the gateway needs requested raw data to answer a client’s authorized request for derived information. Therefore, an intruder into the gateway will be limited in its capabilities. We provide a formal framework for derivation-constrained access control based on Lampson et al.’s “speaks-for” relationship. We demonstrate feasibility of our design with a sample implementation and a performance evaluation.

Palabras clave: Access Control; Location Information; Location Service; Access Control Model; Subject Information.

- Information Flow and Access Control | Pp. 181-195

Information Flow Control to Secure Dynamic Web Service Composition

Dieter Hutter; Melanie Volkamer

The vision of a landscape of heterogeneous web services deployed as encapsulated business software assets in the Internet is currently becoming a reality as part of the Semantic Web. When pro-active agents handle the context-aware discovery, acquisition, composition, and management of application services and data, ensuring the security of customers’ data becomes a principle task. To dynamically compose its offered service, an agent has to process and spread confidential data to other web services demanding the required degree of security. In this paper we propose a methodology based on type-based information flow to control the security of dynamically computed data and their proliferation to other web services.

Palabras clave: MultiAgent System; Security Policy; Security Requirement; Access Control Policy; Security Class.

- Information Flow and Access Control | Pp. 196-210

Analysing a Biometric Authentication Protocol for 3G Mobile Systems Using CSP and Rank Functions

Siraj A. Shaikh; Christos K. Dimitriadis

We study a protocol, called BIO3G, which provides biometric-based user authentication and key establishment in Third Generation (3G) mobile environments. BIO3G provides end-to-end user authentication to the mobile operator, requiring no storing or transferring of biometric data and, eliminating the need for biometric enrolment and administration, which is time-consuming for the user and expensive for the mobile operator. We model BIO3G using process algebra Communicating Sequential Processes (CSP) and verify it using Schneider’s rank functions.

Palabras clave: User Equipment; Rank Function; Mobile Operator; Communicate Sequential Process; Positive Rank.

- Authentication | Pp. 211-226

Attribute-Based Authentication Model for Dynamic Mobile Environments

Michael J. Covington; Manoj R. Sastry; Deepak J. Manohar

Rich, context-aware applications are emerging for mobile computing environments that provide new and innovative services to consumers. Security is critical for the successful realization of this vision. We propose a new method for authentication that utilizes contextual information to overcome the limitations inherent in traditional approaches. We have defined a model that uses contextual attributes to achieve an approach to authentication that is better suited for dynamic, mobile computing environments. We examine the use of trusted platforms to provide assurances for these contextual attributes. Our model promotes the adoption of many revolutionary mobile applications by providing a seamless and flexible user experience that can protect privacy and reduce administrative overhead.

Palabras clave: Service Provider; Mobile Platform; Trusted Platform Module; Access Request; Contextual Attribute.

- Authentication | Pp. 227-242