Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003.

The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefully selected during two rounds of reviewing and improvements. The papers are organized in topical sections on location privacy, security requirements, security policies and protection, authentication and trust, secure infrastructures, smart labels, verifications, and hardware architectures.

Author(s): Friedemann Mattern (auth.), Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann (eds.)
Series: Lecture Notes in Computer Science 2802
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 296
Tags: Computer Communication Networks; Software Engineering; Operating Systems; Data Encryption; Information Systems Applications (incl.Internet); Computers and Society

Front Matter....Pages -
The Age of Pervasive Computing – Everything Smart, Everything Connected?....Pages 1-1
Cyber Assist Project and Its Security Requirement....Pages 2-5
Security in Pervasive Computing....Pages 6-8
The Importance of High Assurance Security in Pervasive Computing....Pages 9-9
A Methodological Assessment of Location Privacy Risks in Wireless Hotspot Networks....Pages 10-24
Protecting Access to People Location Information....Pages 25-38
Smart Devices and Software Agents: The Basics of Good Behaviour....Pages 39-52
Dependability Issues of Pervasive Computing in a Healthcare Environment....Pages 53-70
Protecting Security Policies in Ubiquitous Environments Using One-Way Functions....Pages 71-85
Enforcing Security Policies via Types....Pages 86-100
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems....Pages 101-115
Authentication for Pervasive Computing....Pages 116-129
End-to-End Trust Starts with Recognition....Pages 130-142
Embedding Distance-Bounding Protocols within Intuitive Interactions....Pages 143-156
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments....Pages 157-172
Time Constraint Delegation for P2P Data Decryption....Pages 173-186
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing....Pages 187-200
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems....Pages 201-212
Implementing a Formally Verifiable Security Protocol in Java Card....Pages 213-226
Cellular Automata Based Multiplier for Public-Key Cryptosystem....Pages 227-236
Enlisting Hardware Architecture to Thwart Malicious Code Injection....Pages 237-252
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic....Pages 253-270
Visual Crypto Displays Enabling Secure Communications....Pages 271-284
Security and Privacy in Pervasive Computing State of the Art and Future Directions....Pages 285-289
Back Matter....Pages -