Loading...
Please wait, while we are loading the content...
Similar Documents
Enabling Secure Ad-hoc Communication using Context-Aware Security Services Extended Abstract
| Content Provider | Semantic Scholar |
|---|---|
| Author | Shankar, Narendar Balfanz, Dirk |
| Copyright Year | 2002 |
| Abstract | It is a stated goal of the ubiquitous computing research thrust to make the computer “disappear”. One of the most intrusive aspects about computers today is security management. Thinking about security places an immense burden on users ( e.g.,Is it safe to open this attachment? Should I accept this cookie? Should I let Internet Explorer remember my password?, etc.). Moreover, managing security settings is cumbersome, difficult to understand, and often considered a hassle that is in the way of getting work done [8]. Making security management “disappear” does not only accomplish a goal of ubiquitous computing – we believe that it can, in fact, also make things more secure. If users are bothered less often with dialog boxes that they don’t understand, then they are less likely to make bad decisions. Likewise, if users don’t have to go through a difficult security setup, then they are less likely to skip that cumbersome step. In this paper, we propose a step toward making security management disappear in certain situations. Imagine the following situation: you are at a meeting in a conference room and would like to share a sensitive document you just received with members from various organizations in the conference room. Traditionally, you would have to have some sort of a priori trust information from the intended recipients of your sensitive message (such as their public keys). Exchanging this trust information is a cumbersome step, and not everybody in the room may participate in the same Public Key Infrastructure (PKI). Recently, mechanisms have been suggested to exchange trust information on-the-fly in an ad-hocmanner [2], which would reduce the need for cumbersome setup steps and also eliminate the need for an all-embracing PKI. But the ultimate automation of this process would be if, simply by entering the conference room, all participants of the meeting became members of some sort of secure group communication scheme they could use to communicate with each other. No setup would be necessary, |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.teco.edu/~philip/ubicomp2002ws/organize/palo.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |