Building Secure Communities in Spontaneously Networked Environments

نویسنده

  • Christian Rohner
چکیده

We believe that the critical aspect in providing security for pervasive environments is building security and trust relations between devices without requiring the users to be experts. In this tech-note we present two complementary mechanisms to bootstrap security relations between networked devices: the ownership model and a security policy definition language. The ownership model assures security relations between devices owned by the same user, and the security policy language defines security relations to other devices, assigns rights to relations, and supports authentic key exchange.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Security Scheme for Home Networked Appliances

The term peer-to-peer refers to the concept that in a network of equals (peers) using appropriate information and communication systems, two or more individuals are able to spontaneously collaborate without centralized coordination. A Network Appliance is defined as a dedicated function consumer device with an embedded processor and a network connection. Security for distributed peer-to-peer de...

متن کامل

Networked Graphics - Building Networked Games and Virtual Environments

In this age of modern era, the use of internet must be maximized. Yeah, internet will help us very much not only for important thing but also for daily activities. Many people now, from any level can use internet. The sources of internet connection can also be enjoyed in many places. As one of the benefits is to get the on-line networked graphics building networked games and virtual environment...

متن کامل

A Constructivist Method for the Analysis of Networked Cognitive Communication and the Assessment of Collaborative Learning and Knowledge-building

This article presents a discourse analysis method designed to study networked cognitive communication processes in knowledge communities, such as conceptual change, higher order learning and knowledge building. The method is grounded on genetic epistemology and integrates constructivist and socioconstructivist theoretical concepts. The sentence (understood as judgment) is chosen as the unit of ...

متن کامل

Wireless Network Security

Wireless networking is becoming increasingly prevalent in modern networked environments. This paper examined methods used to secure wireless networks from intrusion and eavesdropping. WEP, WPA and RSN were examined to see the progression from weak to much stronger security for wireless LANs. WEP was incredibly insecure, but these vulnerabilities were addressed to produce significantly more secu...

متن کامل

Keynote Speaker e-Infrastructures for e-Science

Nowadays, proprietary and monolithic IT environments are more and more transformed into standardand component-based service infrastructures. In this keynote, we will analyse this trend especially for the area of e-Science. While in the past decades, scientist have developed centralised, application-focused (silo-oriented) hardware and software environments, they now (for good reasons) tend to j...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004