By Topic

A framework for measuring security of services in ubiquitous computing environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Kennedy, M. ; Sch. of Comput. & Math. Sci., Liverpool John-Moores Univ., Liverpool, UK ; Llewellyn-Jones, D. ; Qi Shi ; Merabti, M.

In a ubiquitous environment it is imagined that services can be combined together to create software systems composed of services. This will offer goal orientated solutions that present functionality greater than their component parts. The idea that a system can be created out of existing services will provide many benefits and allow multiple complex systems to be created, deployed and operated with a reduction in the investment of both time and money for the creation of new systems. This idea can offer further benefits when utilising mature commercial off the shelf components that are proven to be fit for purpose and will reduce the workload in creating a new system. However this approach poses many questions and challenges for the provision of secure systems users can have faith in. These challenges include ensuring secure operation in a multi system environment where the management of some services is outside of the system operator's control, and ensuring one poorly secured service cannot harm the composite system and cause damage or loss to the users of that system. Our current work is focused on methods to provide the means of identifying a secure composition and methods for analysing a composition and providing information about the status of security available within the composition. We propose a framework that will allow service users and system composers the means to identify poorly secured systems or those exhibiting security issues. This will assist them in making a decision about whether to utilise the service or select another more secure service.

Published in:

Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on

Date of Conference:

19-23 March 2012