Picture of person typing on laptop with programming code visible on the laptop screen

World class computing and information science research at Strathclyde...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by University of Strathclyde researchers, including by researchers from the Department of Computer & Information Sciences involved in mathematically structured programming, similarity and metric search, computer security, software systems, combinatronics and digital health.

The Department also includes the iSchool Research Group, which performs leading research into socio-technical phenomena and topics such as information retrieval and information seeking behaviour.

Explore

Security challenges in the personal distributed environment

Schwiderski-grosche, S. and Tomlinson, A. and Goo, S.K. and Irvine, J. (2004) Security challenges in the personal distributed environment. In: 60th IEEE Vehicular Technology Conference, 2004-09-26 - 2004-09-29.

Full text not available in this repository. Request a copy from the Strathclyde author

Abstract

Future communications systems are expected to enable interaction between an increasingly diverse range of devices, both mobile and fixed. This will allow users to construct their own personal distributed environments using a combination of different communications technologies. Depending on the services' availability, the communication configuration could be, for instance, via a cellular system, a wireless ad hoc network, a digital broadcast system, or a fixed telephone network. This new form of communication configuration inherently imposes strict requirements on security, especially when the number of involved entities, accessible network nodes, and service providers increases. The creation of such heterogeneous, dynamic, and distributed networks raises many technical issues. The paper discusses the particular problems involved in securing such an environment and establishes a series of requirements that future security architectures can be based on.