Security models for trusting network appliances

Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe

Research output: Contribution to conferencePaper

12 Citations (Scopus)

Abstract

A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions.

Conference

Conference5th IEEE International Workshop on Networked Appliances
CountryUnited Kingdom
CityLiverpool
Period30/10/0231/10/02

Fingerprint

Ubiquitous computing
Cryptography

Keywords

  • computer security
  • pervasive computing
  • cryptography
  • cryptographic security

Cite this

English, C., Nixon, P., Terzis, S., McGettrick, A., & Lowe, H. (2002). Security models for trusting network appliances. Paper presented at 5th IEEE International Workshop on Networked Appliances, Liverpool, United Kingdom.
English, Colin ; Nixon, Paddy ; Terzis, Sotirios ; McGettrick, Andrew ; Lowe, Helen. / Security models for trusting network appliances. Paper presented at 5th IEEE International Workshop on Networked Appliances, Liverpool, United Kingdom.6 p.
@conference{f81909a72ec14cc89e5e155aa6ef1904,
title = "Security models for trusting network appliances",
abstract = "A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions.",
keywords = "computer security, pervasive computing, cryptography, cryptographic security",
author = "Colin English and Paddy Nixon and Sotirios Terzis and Andrew McGettrick and Helen Lowe",
year = "2002",
month = "10",
day = "31",
language = "English",
note = "5th IEEE International Workshop on Networked Appliances ; Conference date: 30-10-2002 Through 31-10-2002",

}

English, C, Nixon, P, Terzis, S, McGettrick, A & Lowe, H 2002, 'Security models for trusting network appliances' Paper presented at 5th IEEE International Workshop on Networked Appliances, Liverpool, United Kingdom, 30/10/02 - 31/10/02, .

Security models for trusting network appliances. / English, Colin; Nixon, Paddy; Terzis, Sotirios; McGettrick, Andrew; Lowe, Helen.

2002. Paper presented at 5th IEEE International Workshop on Networked Appliances, Liverpool, United Kingdom.

Research output: Contribution to conferencePaper

TY - CONF

T1 - Security models for trusting network appliances

AU - English, Colin

AU - Nixon, Paddy

AU - Terzis, Sotirios

AU - McGettrick, Andrew

AU - Lowe, Helen

PY - 2002/10/31

Y1 - 2002/10/31

N2 - A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions.

AB - A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover,these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions.

KW - computer security

KW - pervasive computing

KW - cryptography

KW - cryptographic security

UR - http://www.cis.strath.ac.uk/research/publications/papers/strath_cis_publication_210.pdf

M3 - Paper

ER -

English C, Nixon P, Terzis S, McGettrick A, Lowe H. Security models for trusting network appliances. 2002. Paper presented at 5th IEEE International Workshop on Networked Appliances, Liverpool, United Kingdom.