Philosophical Transactions of the Royal Society A

Security Policies and Trust in Ubiquitous Computing

, , , , and

Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artifacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.


  • 116347 bytes

policy, privacy, security, trust, ubiquitous computing

Article

Royal Society Publishing

366

1881

Downloads: 2695 downloads

Google Scholar Citations: 1 citation

UMBC ebiquity