Message Quality for Ambient System Security Ciarán Bryce

نویسنده

  • Ciarán Bryce
چکیده

In ambient systems, a principal may be a physical object whose identity does not convey useful information for taking security decisions. Thus, establishing a trusted channel with a device depends more on the device being able to demonstrate what it does, rather than who it is. This paper proposes a security model that allows a principal to establish the intent of an adversary and to make the adversary prove its trustworthiness by furnishing proof of current and past behavior. Key-words: Security, ambient systems, trust, programming model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Message Quality for Ambient System Security

In ambient systems, a principal may be a physical object whose identity does not convey useful information for taking security decisions. Thus, establishing a trusted channel with a device depends more on the device being able to demonstrate what it does, rather than who it is. This paper proposes a security model that allows a principal to establish the intent of an adversary and to make the a...

متن کامل

A Security Proof System for Networks of Communicating Processes Jean-pierre Banâtre, Ciarán Bryce

Information ow control mechanisms detect and prevent transfers of information which violate the security constraints placed on a system. In this paper we study a programming language based approach to ow control in a system of communicating processes. The language chosen to present these ideas is CSP. We give the "security semantics" of CSP and show, with the aid of two examples, how the semant...

متن کامل

Message Quality for Pervasive System Security

Security is a challenge in pervasive systems for several reasons. First, the large number of peers challenges the use of centralised security services like certificate authorities and reputation services. Second, a principal may be a physical object whose identity might not convey useful information for taking security decisions. Establishing a trusted channel depends more on a principal being ...

متن کامل

An approach to information security in distributed systems

C. Bryce, J-P. Banâtre, D. Le M etayer IRISA/INRIA-Rennes, Campus de Beaulieu, 35042 Rennes Cedex, France. Abstract Information ow control mechanisms detect and prevent illegal transfers of information within a computer system. In this paper, we give an overview of a programming language based approach to information ow control in a system of communicating processes. The language chosen to pres...

متن کامل

A New Hybrid Method for Colored Image Steganography Based On DWT

Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008