Security for Ubiquitous ComputingISBN: 978-0-470-84493-9
Hardcover
268 pages
February 2002
![]() |
About the Author.
Forward.
Preface.
Acknowledgements.
Contact Information.
1. Introduction.
Scenario.
Essential terminology.
Problems.
Notation.
2. Ubiquitous computing.
Xerox PARC.
Norman's Invisible Computer.
MIT.
HP's Cooltown.
ORL/AT&T Labs Cambridge.
Security issues.
3. Computer security.
Confidentiality.
Integrity.
Availability.
Authentication.
Security policies.
4. Authentication.
New preconditions.
The Resurrecting Duckling security policy model.
The many ways of being a master.
5. Confidentiality.
Cryptographic primitives for peanut processors.
Personal privacy.
6. Integrity.
Message integrity.
Device integrity.
7. Availability.
Threats to the communications channel.
Threats to the battery energy.
Threats from mobile code.
8. Anonymity.
The Cocaine Auction Protocol.
The anonymity layer.
9. Conclusions.
Appendix A: A Short Primer on Functions.
Appendix B: Existing Network Security Solutions.
Annotated bibliography.
Index.
Forward.
Preface.
Acknowledgements.
Contact Information.
1. Introduction.
Scenario.
Essential terminology.
Problems.
Notation.
2. Ubiquitous computing.
Xerox PARC.
Norman's Invisible Computer.
MIT.
HP's Cooltown.
ORL/AT&T Labs Cambridge.
Security issues.
3. Computer security.
Confidentiality.
Integrity.
Availability.
Authentication.
Security policies.
4. Authentication.
New preconditions.
The Resurrecting Duckling security policy model.
The many ways of being a master.
5. Confidentiality.
Cryptographic primitives for peanut processors.
Personal privacy.
6. Integrity.
Message integrity.
Device integrity.
7. Availability.
Threats to the communications channel.
Threats to the battery energy.
Threats from mobile code.
8. Anonymity.
The Cocaine Auction Protocol.
The anonymity layer.
9. Conclusions.
Appendix A: A Short Primer on Functions.
Appendix B: Existing Network Security Solutions.
Annotated bibliography.
Index.