UMBC ebiquity

Security Policies and Trust in Ubiquitous Computing

Authors: Anupam Joshi, Tim Finin, Lalana Kagal, Jim Parker, and Anand Patwardhan

Journal: Philosophical Transactions of the Royal Society A

Date: October 28, 2008

Abstract: Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artifacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

Type: Article

Publisher: Royal Society Publishing

Pages: 3769-3780

Number: 1881

Volume: 366

Tags: ubiquitous computing, security, policy, trust, privacy

Google Scholar: gn6sz6vjrUQJ

Number of Google Scholar citations: 1 [show citations]

Number of downloads: 1966


Available for download as

size: 116347 bytes