Strathprints logo
Strathprints Home | Open Access | Browse | Search | User area | Copyright | Help | Library Home | SUPrimo

Security models for trusting network appliances

English, C. and Nixon, P. and Terzis, S. and McGettrick, A. and Lowe, H. (2002) Security models for trusting network appliances. In: 5th IEEE International Workshop on Networked Appliances, 2002-10-30 - 2002-10-31, Liverpool.

[img]
Preview
PDF (strathprints002516.pdf)
Download (160Kb) | Preview

    Abstract

    A significant characteristic of pervasive computing is the need for secure interactions between highly mobile entities and the services in their environment. Moreover, these decentralised systems are also characterised by partial views over the state of the global environment, implying that we cannot guarantee verification of the properties of the mobile entity entering an unfamiliar domain. Secure in this context encompasses both the need for cryptographic security and the need for trust, on the part of both parties, that the interaction is functioning as expected. In this paper we make a broad assumption that trust and cryptographic security can be considered as orthogonal concerns (i.e. cryptographic measures do not ensure transmission of correct information). We assume the existence of reliable encryption techniques and focus on the characteristics of a model that supports the management of the trust relationships between two devices during ad-hoc interactions.

    Item type: Conference or Workshop Item (Paper)
    ID code: 2516
    Keywords: computer security, pervasive computing, cryptography, cryptographic security, Electronic computers. Computer science
    Subjects: Science > Mathematics > Electronic computers. Computer science
    Department: Faculty of Science > Computer and Information Sciences
    Related URLs:
      Depositing user: Strathprints Administrator
      Date Deposited: 09 Feb 2007
      Last modified: 18 Jul 2013 16:51
      URI: http://strathprints.strath.ac.uk/id/eprint/2516

      Actions (login required)

      View Item

      Fulltext Downloads: