Create an Account
username: password:
 
  MemeStreams Logo

Security and Privacy in Ubiquitous Computing

search

Jeremy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Jeremy's topics
Arts
  Literature
   Classical
   Fiction
   Horror
   Non-Fiction
   Sci-Fi/Fantasy Literature
  Movies
   Movie Genres
    Action/Adventure
    Cult Films
    Documentary
    Drama
    Horror
    Independent Films
    Film Noir
    Sci-Fi/Fantasy Films
    War
  Music
   Music Styles
    Classical
    Electronic Music
    Rap & Hip Hop
    IDM
    Jazz
    World Music
  TV
   TV Documentary
   TV Drama
   SciFi TV
Business
  Finance & Accounting
  Industries
   Tech Industry
   Telecom Industry
  Management
  Markets & Investing
Games
  Video Games
   PC Video Games
   Console Video Games
Health and Wellness
  Medicine
Home and Garden
  Cooking
  Entertaining
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   California
    SF Bay Area
   Events in Washington D.C.
   News for Washington D.C.
   Georgia
    Atlanta
     Atlanta Events
Science
  Biology
  History
  Math
  Medicine
  Nano Tech
  Physics
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   PC Hardware
   Human Computer Interaction
   Computer Networking
   Macintosh
   Software Development
    Open Source Development
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Security and Privacy in Ubiquitous Computing
Topic: Computer Security 11:39 am EST, Jan  3, 2004

Like most information technologies, Mobile and Ubiquitous Computing carries a number of security and privacy implications. We feel that care should be taken to consider these issues when designing Ubicomp systems. In this report we will enumerate a number of the privacy concerns in Ubicomp and provide a philisophical discussion of the importance of addressing these problems. In considering these problems we have found that a number of Ubicomp techniques are in fact well suited to solving security and privacy problems that arise in Ubicomp. We will discuss some of these techniques in the hope of inspiring further consideration. Systems described include a secure RF-ID system, an architecture for setting privacy levels based on context, and a wearable cryptographic authenticator.

This is an old paper, but Georgia Tech has removed it from the Google index. It can be found in the Wayback machine index, but not displayed from the archive because of the robots.txt exclusion.

Security and Privacy in Ubiquitous Computing



 
 
Powered By Industrial Memetics
RSS2.0