By Topic

A security framework for executables in a ubiquitous computing environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
D. Llewellyn-Jones ; Sch. of Comput. & Math. Sci., Liverpool John Moores Univ., UK ; M. Merabti ; Q. Shi ; B. Askwith

The vision of ubiquitous computing presents us with unique difficulties in terms of maintaining security. Many of these relate to privacy or quality of service issues, but underpinning these is the requirement for secure execution of code. We present a novel framework for utilising a hybrid method of code analysis combined with component composition techniques. The aim has been to allow sandboxing techniques to maintain security dynamically in a ubiquitous computing environment. We argue that whilst security issues for ubiquitous computing are particularly acute, characteristics of the environment can also be harnessed advantageously to fulfil these security requirements.

Published in:

Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE  (Volume:4 )

Date of Conference:

29 Nov.-3 Dec. 2004