Message Quality for Ambient System Security Ciarán Bryce
نویسنده
چکیده
In ambient systems, a principal may be a physical object whose identity does not convey useful information for taking security decisions. Thus, establishing a trusted channel with a device depends more on the device being able to demonstrate what it does, rather than who it is. This paper proposes a security model that allows a principal to establish the intent of an adversary and to make the adversary prove its trustworthiness by furnishing proof of current and past behavior. Key-words: Security, ambient systems, trust, programming model.
منابع مشابه
Message Quality for Ambient System Security
In ambient systems, a principal may be a physical object whose identity does not convey useful information for taking security decisions. Thus, establishing a trusted channel with a device depends more on the device being able to demonstrate what it does, rather than who it is. This paper proposes a security model that allows a principal to establish the intent of an adversary and to make the a...
متن کاملA Security Proof System for Networks of Communicating Processes Jean-pierre Banâtre, Ciarán Bryce
Information ow control mechanisms detect and prevent transfers of information which violate the security constraints placed on a system. In this paper we study a programming language based approach to ow control in a system of communicating processes. The language chosen to present these ideas is CSP. We give the "security semantics" of CSP and show, with the aid of two examples, how the semant...
متن کاملMessage Quality for Pervasive System Security
Security is a challenge in pervasive systems for several reasons. First, the large number of peers challenges the use of centralised security services like certificate authorities and reputation services. Second, a principal may be a physical object whose identity might not convey useful information for taking security decisions. Establishing a trusted channel depends more on a principal being ...
متن کاملAn approach to information security in distributed systems
C. Bryce, J-P. Banâtre, D. Le M etayer IRISA/INRIA-Rennes, Campus de Beaulieu, 35042 Rennes Cedex, France. Abstract Information ow control mechanisms detect and prevent illegal transfers of information within a computer system. In this paper, we give an overview of a programming language based approach to information ow control in a system of communicating processes. The language chosen to pres...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008