Abstract
A significant characteristic of ubiquitous computing is the need for interactions of highly mobile entities to be secure: secure both for the entity and the environment in which the entity operates. Moreover, ubiquitous computing is also characterised by partial views over the
state of the global environment, implying that we cannot guarantee that an environment can always verify the properties of the mobile entity that it has just received. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption
that trust and cryptographic security can be considered as orthogonal concerns (i.e. an entity
might encrypt a deliberately incorrect answer to a legitimate request). We assume the existence of
reliable encryption techniques and focus on the characteristics of a model that supports the
management of the trust relationships between two entities during an interaction in a ubiquitous
environment.
Original language | English |
---|---|
Number of pages | 4 |
Publication status | Published - 1 Oct 2002 |
Event | First Workshop on Security in Ubiquitous Computing at the Fourth Annual Conference on Ubiquitous Computing (Ubicomp2002) - Gothenburg, Sweden Duration: 29 Sept 2002 → 1 Oct 2002 |
Conference
Conference | First Workshop on Security in Ubiquitous Computing at the Fourth Annual Conference on Ubiquitous Computing (Ubicomp2002) |
---|---|
City | Gothenburg, Sweden |
Period | 29/09/02 → 1/10/02 |
Keywords
- ubiquitous computing
- encryption
- security
- software