Research Statement for Geetanjali Sampemane Security for Ubiquitous Computing

نویسنده

  • Geetanjali Sampemane
چکیده

My research interests are in building secure systems. I am especially interested in the interactions between theoretical approaches to security, the principles of systems design, and human factors that affect security in real-world systems. As we entrust ever more of our lives to the correct operation of complex interconnected systems, the security of these systems in an increasingly important concern. However, we still do not understand how to build large systems that are secure. While low-level securitymechanisms are reasonably well-understood, security failures are often the result of inappropriate composition of these elements.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Security and Privacy for Pervasive Computing

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional dist...

متن کامل

Performance Monitoring on an HPVM Cluster

Clusters of workstations are becoming popular platforms for parallel computing, but performance on these systems is more complex and harder to predict than on traditional parallel machines. Hence, performance monitoring and analysis is important for understanding application behavior and improving performance. We present a performance monitor for HPVM, a high-performance cluster running Windows...

متن کامل

Clicky: User-centric Input for Active Spaces

We present a user-centric input system that is useful for a variety of applications in ubiquitous computing environments. Users in these environments currently switch between different keyboards and mice, or other devices, to interact with all the devices present. Allowing users to select a personal input device for the space and use it to interact with all the devices in the space is a more na...

متن کامل

Access Control for Active Spaces

Active Spaces are physical spaces augmented with heterogeneous computing and communication devices along with supporting software infrastructure. This integration facilitates collaboration between users, and promotes greater levels of interaction between users and devices. An Active Space can be configured for different types of applications at different times. We present an access control syst...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005