This paper discusses the main issues regarding the reliability and the efficacy of standard cryptographic techniques applied to pervasive computing. First of all, we describe a set of scenarios, where social interactions are supported by smallsized pervasive devices. These are expected to manage and exchange personal and sensible information with context-specific requirements. We present a general methodology that helps identifying the most suitable model for securing data storage, processing and communication. Three protocols and systems are formally described and compared in this framework, in respect of model’s complexity and security capabilities.
Privacy in communication among pervasive objects: methodologies for securing the exchange of sensible information
MONTESSORO, Pier Luca;PIERATTONI, Davide;
2007-01-01
Abstract
This paper discusses the main issues regarding the reliability and the efficacy of standard cryptographic techniques applied to pervasive computing. First of all, we describe a set of scenarios, where social interactions are supported by smallsized pervasive devices. These are expected to manage and exchange personal and sensible information with context-specific requirements. We present a general methodology that helps identifying the most suitable model for securing data storage, processing and communication. Three protocols and systems are formally described and compared in this framework, in respect of model’s complexity and security capabilities.File | Dimensione | Formato | |
---|---|---|---|
Privacy in communication among pervasive objects (UBICC).pdf
non disponibili
Tipologia:
Altro materiale allegato
Licenza:
Non pubblico
Dimensione
810.47 kB
Formato
Adobe PDF
|
810.47 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.