Picture of athlete cycling

Open Access research with a real impact on health...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by Strathclyde researchers, including by researchers from the Physical Activity for Health Group based within the School of Psychological Sciences & Health. Research here seeks to better understand how and why physical activity improves health, gain a better understanding of the amount, intensity, and type of physical activity needed for health benefits, and evaluate the effect of interventions to promote physical activity.

Explore open research content by Physical Activity for Health...

Security challenges in the personal distributed environment

Schwiderski-grosche, S. and Tomlinson, A. and Goo, S.K. and Irvine, J. (2004) Security challenges in the personal distributed environment. In: 60th IEEE Vehicular Technology Conference, 2004-09-26 - 2004-09-29.

Full text not available in this repository. Request a copy from the Strathclyde author

Abstract

Future communications systems are expected to enable interaction between an increasingly diverse range of devices, both mobile and fixed. This will allow users to construct their own personal distributed environments using a combination of different communications technologies. Depending on the services' availability, the communication configuration could be, for instance, via a cellular system, a wireless ad hoc network, a digital broadcast system, or a fixed telephone network. This new form of communication configuration inherently imposes strict requirements on security, especially when the number of involved entities, accessible network nodes, and service providers increases. The creation of such heterogeneous, dynamic, and distributed networks raises many technical issues. The paper discusses the particular problems involved in securing such an environment and establishes a series of requirements that future security architectures can be based on.