|
Security and Privacy in Ubiquitous Computing by Decius at 12:37 am EST, Feb 5, 2003 |
] Like most information technologies, Mobile and Ubiquitous ] Computing carries a number of security and privacy ] implications. We feel that care should be taken to ] consider these issues when designing Ubicomp systems. In ] this report we will enumerate a number of the privacy ] concerns in Ubicomp and provide a philisophical ] discussion of the importance of addressing these ] problems. In considering these problems we have found ] that a number of Ubicomp techniques are in fact well ] suited to solving security and privacy problems that ] arise in Ubicomp. We will discuss some of these ] techniques in the hope of inspiring further ] consideration. Systems described include a secure RF-ID ] system, an architecture for setting privacy levels based ] on context, and a wearable cryptographic authenticator. This is probably the coolest paper I've ever written, and for one of the coolest classes I ever took. I'm linking this here because I've had to dig it out of Georgia Tech's site twice now and I figure it ought to be easy to find... |
Security and Privacy in Ubiquitous Computing by Jeremy at 11:39 am EST, Jan 3, 2004 |
Like most information technologies, Mobile and Ubiquitous Computing carries a number of security and privacy implications. We feel that care should be taken to consider these issues when designing Ubicomp systems. In this report we will enumerate a number of the privacy concerns in Ubicomp and provide a philisophical discussion of the importance of addressing these problems. In considering these problems we have found that a number of Ubicomp techniques are in fact well suited to solving security and privacy problems that arise in Ubicomp. We will discuss some of these techniques in the hope of inspiring further consideration. Systems described include a secure RF-ID system, an architecture for setting privacy levels based on context, and a wearable cryptographic authenticator. This is an old paper, but Georgia Tech has removed it from the Google index. It can be found in the Wayback machine index, but not displayed from the archive because of the robots.txt exclusion. |
|
|