Security in Pervasive Computing

First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers

  • Dieter Hutter
  • Günter Müller
  • Werner Stephan
  • Markus Ullmann
Conference proceedings

DOI: 10.1007/b95124

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2802)

Table of contents (24 papers)

  1. Front Matter
  2. Invited Talks (Abstracts)

  3. Location Privacy

    1. Protecting Access to People Location Information
      Urs Hengartner, Peter Steenkiste
      Pages 25-38
  4. Security Requirements

    1. Smart Devices and Software Agents: The Basics of Good Behaviour
      Howard Chivers, John A. Clark, Susan Stepney
      Pages 39-52
    2. Dependability Issues of Pervasive Computing in a Healthcare Environment
      Jürgen Bohn, Felix Gärtner, Harald Vogt
      Pages 53-70
  5. Security Policies and Protection

    1. Protecting Security Policies in Ubiquitous Environments Using One-Way Functions
      Håkan Kvarnström, Hans Hedbom, Erland Jonsson
      Pages 71-85
    2. Enforcing Security Policies via Types
      Daniele Gorla, Rosario Pugliese
      Pages 86-100
  6. Authentication and Trust

    1. Authentication for Pervasive Computing
      Sadie Creese, Michael Goldsmith, Bill Roscoe, Irfan Zakiuddin
      Pages 116-129
    2. End-to-End Trust Starts with Recognition
      Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen
      Pages 130-142
    3. Embedding Distance-Bounding Protocols within Intuitive Interactions
      Laurent Bussard, Yves Roudier
      Pages 143-156
  7. Secure Infrastructures

  8. Smart Labels

    1. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
      Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest, Daniel W. Engels
      Pages 201-212
  9. Verification

    1. Implementing a Formally Verifiable Security Protocol in Java Card
      Engelbert Hubbers, Martijn Oostdijk, Erik Poll
      Pages 213-226

About these proceedings

Keywords

Delegation Information Java Java Card Web security authentication handhelds healthcare identification internet security secure networking security trust ubiquitous computing wireless network security

Editors and affiliations

  • Dieter Hutter
    • 1
  • Günter Müller
    • 2
  • Werner Stephan
    • 3
  • Markus Ullmann
    • 4
  1. 1.DFKISaarbrückenGermany
  2. 2.Institute of Computer Science and Social Studies, Department of TelematicsAlbert-Ludwig University FreiburgGermany
  3. 3.German Research Center for Artificial Intelligence, DFKI GmbH 
  4. 4.Federal Office for Information Security (BSI)BonnGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2004
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20887-7
  • Online ISBN 978-3-540-39881-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349