Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007)

19-19 July 2007

Filter Results

Displaying Results 1 - 20 of 20
  • Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for reuse | PDF file iconPDF (311 KB)
    Freely Available from IEEE
  • Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for reuse | PDF file iconPDF (59 KB)
    Freely Available from IEEE
  • Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing - Table of contents

    Publication Year: 2007, Page(s):v - vi
    Request permission for reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Predicting Trustworthiness for Component Software

    Publication Year: 2007, Page(s):1 - 6
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    Trust has been recognized as an important factor for component software. In this paper, we propose a methodology to predict trustworthiness of a software component for downloading and execution. The methodology is based on a trust model of software component, which indicates the component's asserted performance and requirements for achieving the performance. Through evaluating the related trust mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote Management and Secure Application Development for Pervasive Home Systems Using JASON

    Publication Year: 2007, Page(s):7 - 12
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    In a modern house, the number of electronic devices keeps increasing. More and more of these devices become interconnected, to provide new services. And they start disappearing in the environment, forming a truly pervasive home system. The embedded devices in such pervasive networks are usually owned and managed by several entities with conflicting interests. This makes secure remote management of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usage Control Reference Monitor Architecture

    Publication Year: 2007, Page(s):13 - 18
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (294 KB) | HTML iconHTML

    It is envisioned that more and more mobile devices will be available in the future which also means that more data like location data will be available. A secure management of this kind of data is an important topic. Especially location data raises privacy questions like who is allowed to handle the location data or what can be done with the data after it was accessed. Usage control is concerned w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Routing in Integrated Mobile Ad hoc Network (MANET)-Internet

    Publication Year: 2007, Page(s):19 - 24
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    This paper proposes a light weight solution for secure routing in integrated mobile ad hoc network (MANET)- Internet. The proposed framework addresses the following: i) application of IBC to ad hoc networks for efficient key management and for the distribution of pair-wise shared keys among the authenticated nodes; ii) providing secure Internet connectivity while the mobile node(MN) roams across d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks

    Publication Year: 2007, Page(s):25 - 30
    Cited by:  Papers (13)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (106 KB) | HTML iconHTML

    Trust plays an important role in human life environments and virtual organizations. In the context of a network, trust may help its elements to decide whether another member of the same network is being uncooperative or malicious. Trust becomes quite important in self-configurable and autonomous systems, such as wireless sensor networks (WSN). However, very little effort has been done in the field... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks

    Publication Year: 2007, Page(s):31 - 36
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (128 KB) | HTML iconHTML

    In order to communicate securely in wireless sensor networks, secret keys between neighbor sensor nodes must be established. Until now, a number of key pre-distribution schemes have been proposed but these schemes have serious drawbacks of demanding memory overhead and having a weakness for node capture attack. Recently, practical key pre-distribution schemes using deployment knowledge are being p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards effective Wireless Intrusion Detection in IEEE 802.11i

    Publication Year: 2007, Page(s):37 - 42
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    The proliferation of wireless devices and the availability of wireless applications and services constantly raise new security concerns. Towards this direction, wireless intrusion detection systems (WIDS) can assist a great deal to proactively and reactively protect wireless networks, thus discouraging or repealing potential adversaries. In this paper we discuss the major wireless attack categorie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Certificate Signature for Pervasive Environment

    Publication Year: 2007, Page(s):43 - 48
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (531 KB) | HTML iconHTML

    In distributed systems especially in pervasive environments, the users usually face difficulties to obtain permissions to use the surrounding resources. Either they have an account locally, or they can show a certificate obtained beforehand given them the access. Problems arise when they arrive in an unknown environment occurring in a pervasive environment. In this paper, we propose the Chameleon ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Security-by-Contract Architecture for Pervasive Services

    Publication Year: 2007, Page(s):49 - 54
    Cited by:  Papers (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (793 KB) | HTML iconHTML

    Future pervasive environments will be characterised by pervasive client downloads: new (untrusted) clients will be dynamically downloaded in order to exploit the computational power of the nomadic devices to make a better use of the services available in the environment. To address the challenges of this paradigm we propose the notion of security-by-contract (SxC), as in programming-by-contract, b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags

    Publication Year: 2007, Page(s):55 - 60
    Cited by:  Papers (19)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    The vast majority of works on RFID security focus only on privacy and tracking (violation of location privacy). However, in this paper we are interested in a new mechanism that enables a pair of RFID tags to generate a proof of having been simultaneously scanned by a reading device. In 2004, Juels introduced this concept and presented a proof named "yooking proof. Saito and Sakurai (2005) showed h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Storage-Awareness: RFID Private Authentication based on Sparse Tree

    Publication Year: 2007, Page(s):61 - 66
    Cited by:  Papers (11)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (165 KB) | HTML iconHTML

    As the growing use of radio frequency identification (RFID) technology to enhance ubiquitous computing environments, the privacy protection problem becomes a crucial issue. The objective of private authentication for RFID systems is to allow valid readers explicitly authenticate their dominated tags without leaking tags' private information. To achieve strong privacy, recently, Lu et al. propose a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Mobile RFID system against privacy and security problems

    Publication Year: 2007, Page(s):67 - 72
    Cited by:  Papers (12)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Radio frequency identification (RFID) systems based on EPC (electronic product code) network environment automatically identify tagged objects, using RF signals without direct contact. The RFID system will replace the Bar-code system, because it provides storage ability and contactless property. Recently, researchers introduced the mobile RFID system, which integrates a mobile system with a RFID t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags

    Publication Year: 2007, Page(s):73 - 78
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    Radio frequency identification(RFID) systems are being used in many applications such as the supply chain. The widespread usage of tags creates new threats of security and privacy in RFID systems. Many schemes have been proposed to provide security and privacy, based on basic cryptographic primitives such as hash function and encryption algorithm. However, it may be a burden on a resource-constrai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Architecture for Secure VoIP and Collaboration Applications

    Publication Year: 2007, Page(s):79 - 84
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (194 KB) | HTML iconHTML

    VoIP and collaboration Internet applications are a driving force for the use and expansion of the Internet. Current applications usually require end user registration in a central user database, which in turn provides directory services to the users of the relevant system; in addition they use either two bridged client- server connections between the end users and the server or they allow direct c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identity Based Private Matching

    Publication Year: 2007, Page(s):85 - 90
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (187 KB) | HTML iconHTML

    There is an increasing need for privately matching data across autonomous entities. Practical private matching applications often require respecting privacy limits and enforcing correctness simultaneously. However, existing schemes have substantial weakness and do not meet the requirement. In this paper, we propose a new private matching scheme based on bilinear paring in a public key system: Iden... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2007, Page(s): 91
    Request permission for reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE