Ubiquitous security for ubiquitous computing |
| |
Authors: | Zia Hayat Jeff Reeve Chris Boutle |
| |
Affiliation: | aUniversity of Southampton, United Kingdom;bBAE Systems |
| |
Abstract: | The potential for rapid and diverse interconnectivity through devices utilising heterogeneous communications interfaces has enabled a truly ubiquitous computing environment. However, this has resulted in equally ubiquitous security risks due principally to the number and complexity of services being run over such networks. As technology advances towards the realisation of a ubiquitous computing environment, what impact does this have on the traditional information security triangle, of preserving the confidentiality, integrity and availability of information? And how does this influence, future information security requirements, particularly in light of always-on business processes which require real-time information sharing? This paper describes research conducted into answering these questions. Emphasis is placed on the need for risk management, and how this may be achieved through context-based access control mechanisms and pro-active threat assessment techniques. |
| |
Keywords: | |
本文献已被 ScienceDirect 等数据库收录! |
|