Security models for trusting network appliances

Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe

Research output: Contribution to conferencePaperpeer-review

12 Citations (Scopus)
158 Downloads (Pure)

Abstract

A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions.
Original languageEnglish
Number of pages6
Publication statusPublished - 31 Oct 2002
Event5th IEEE International Workshop on Networked Appliances - Liverpool, United Kingdom
Duration: 30 Oct 200231 Oct 2002

Conference

Conference5th IEEE International Workshop on Networked Appliances
Country/TerritoryUnited Kingdom
CityLiverpool
Period30/10/0231/10/02

Keywords

  • computer security
  • pervasive computing
  • cryptography
  • cryptographic security

Fingerprint

Dive into the research topics of 'Security models for trusting network appliances'. Together they form a unique fingerprint.

Cite this