Abstract
In ambient systems, a principal may be a physical object whose identity does not convey useful information for taking security decisions. Thus, establishing a trusted channel with a device depends more on the device being able to demonstrate what is does, rather than who it is. This paper proposes a security model that allows a principal to establish the intent of an adversary and to make the adversary prove its trustworthiness by furnishing proof of current and past behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bryce, C.: Message quality for ambient system security. Technical Report P11896, IRISA (2008)
Bryce, C., Razafimahefa, C., Pawlak, M.: Lana: An approach to programming autonomous systems. In: Magnusson, B. (ed.) ECOOP 2002. LNCS, vol. 2374, pp. 281–298. Springer, Heidelberg (2002)
Couderc, P., BanĂ¢tre, M.: Ambient computing applications: an experience with the SPREAD approach. In: HICSS, p. 291 (2003)
FBI/CSI. 12th annual csi/fbi computer crime and security survey (2007)
Gelernter, D.: Generative communication in Linda. ACM Transactions on Programming Languages and Systems 7(1), 80–112 (1985)
Gosling, J., Joy, B., Steele, G., Bracha, G.: The Java Language Specification, 3rd edn. The Java Series. Addison-Wesley, Boston (2005)
Konstantas, D., Jones, V., Herzog, R.: Mobihealth - innovative 2.5/3G mobile services and applications for health care. In: IST Mobile & wireless telecommunications Summit 2002, Thessaloniki, Greece, June 17-19 (2002)
Mckitterick, D., Dowling, J.: State of the art review of mobile payment technology. Technical report, June 13 (2003)
MetaGroup. Spam, viruses, and content compliance: An opportunity to strategically respond to immediate tactical concerns. Technical Report 800-945-META [6382], International Computer Science Institute (January 2005)
Necula, G.C.: Proof-carrying code. In: POPL, pp. 106–119 (1997)
Pellegrino, P., Bonino, D., Corno, F.: Domotic house gateway. In: Haddad, H. (ed.) SAC, pp. 1915–1920. ACM Press, New York (2006)
Picco, G.P., Murphy, A.L., Roman, G.-C.: LIME: Linda meets mobility. In: Proceedings of the  21st International Conference on Software Engineering, May 1999, pp. 368–377. ACM Press, New York (1999)
Poritz, J., Schunter, M., Van Herreweghen, E., Waidner, M.: Property attestation—scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research (May 2004)
Rivest, R., Shamir, A., Adleman, L.: On digital signatures and public key cryptosystems. Comm. A.C.M. 21, 120–126 (1978)
Sekar, R., Venkatakrishnan, V.N., Basu, S., Bhatkar, S., DuVarney, D.C.: Model-carrying code: a practical approach for safe execution of untrusted applications. In: SOSP, pp. 15–28 (2003)
Shmatikov, V., Talcott, C.L.: Reputation-based trust management. Journal of Computer Security 13(1), 167–190 (2005)
Trusted Computing Group. TPM main specification. Main Specification Version 1.2 rev. 85, Trusted Computing Group (February 2005)
Zannone, N.: A survey on trust management languages [reduced]. Technical report, August 01(2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bryce, C. (2008). Message Quality for Ambient System Security. In: Coudert, D., Simplot-Ryl, D., Stojmenovic, I. (eds) Ad-hoc, Mobile and Wireless Networks. ADHOC-NOW 2008. Lecture Notes in Computer Science, vol 5198. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85209-4_35
Download citation
DOI: https://doi.org/10.1007/978-3-540-85209-4_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85208-7
Online ISBN: 978-3-540-85209-4
eBook Packages: Computer ScienceComputer Science (R0)