Ubiquitous / Pervasive Computing Security
Today's ever smaller computers are increasingly spreading in our
environment. Being available ubiquitously in the devices and appliances
that we use everyday, this embedded computing power will increase
their capacities. Furthermore, these computers are also increasingly
interconnected into varying range networks, thus enabling access to a
pervasive flow of information and services.
The goal of this research theme is to analyse new security and privacy
issues arising from the novel architecture of ubiquitous and pervasive
systems and to propose solutions to safely deploy services and
appliances. This theme addresses both a priori and open trust models.
- Bussard, Laurent;Roudier, Yves;Kilian-Kehr, Roger;Crosta, Stefano.
Trust and authorization in pervasive B2E scenarios .
To appear in proceedings of ISC'03, 6th Information Security Conference, October 1st-3rd, 2003, Bristol, UK.
- Bussard, Laurent;Roudier, Yves.
Embedding distance bounding protocols within intuitive interactions .
In proceedings of SPC'2003, 1rst International Conference on Security in Pervasive Computing, March 12-13, 2003, Boppard, Germany.
- L. Bussard, Y. Roudier.
Authentication in Ubiquitous
Computing. UBICOMP 2002, Workshop on Security in Ubiquitous Computing, Göteborg, Sweden, Sept 29th, 2002.