<p>This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19β21, 2006 in York, UK. The conference focused on methods, tools, principles, and practices for assessing and achievingsecurityinapervasiveenvironment.Newsecu
Security in Pervasive Computing: Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005. Proceedings
β Scribed by Lorenz M. Hilty (auth.), Dieter Hutter, Markus Ullmann (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2005
- Tongue
- English
- Leaves
- 248
- Series
- Lecture Notes in Computer Science 3450 : Security and Cryptology
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the refereed proceedings of the Second International Conference on Security in Pervasive Computing, SPC 2005, held in Boppard, Germany in April 2005.
The 14 revised full papers and 3 revised short papers presented together with abstracts of 5 invited talks were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on smart devices and applications, authentication, privacy and anonymity, and access control and information flow.
β¦ Table of Contents
Front Matter....Pages -
Pervasive Computing β A Case for the Precautionary Principle?....Pages 1-2
TENeT: A Framework for Distributed Smartcards....Pages 3-17
P2P Digital Value Fair Trading System Using Smart Cards....Pages 18-30
βDevices Are People Tooβ Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example....Pages 31-45
Securing Ad Hoc Networks....Pages 46-47
Secure Identity Management for Pseudo-Anonymous Service Access....Pages 48-55
Security Issues for Pervasive Personalized Communication Systems....Pages 56-62
Safeguards in a World of Ambient Intelligence....Pages 63-69
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment....Pages 70-84
Security Concept of the EU-Passport....Pages 85-85
Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks....Pages 86-100
Ephemeral Pairing on Anonymous Networks....Pages 101-116
EPC Technology....Pages 117-118
Exploiting Empirical Engagement in Authentication Protocol Design....Pages 119-133
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems....Pages 134-150
Look Whoβs Talking β Authenticating Service Access Points....Pages 151-162
Security Issues of Mobile Devices....Pages 163-163
Privacy for Profitable Location Based Services....Pages 164-178
On the Anonymity of Periodic Location Samples....Pages 179-192
A Theorem Proving Approach to Analysis of Secure Information Flow....Pages 193-209
An Efficient Access Control Model for Mobile Ad-Hoc Communities....Pages 210-224
TrustAC: Trust-Based Access Control for Pervasive Devices....Pages 225-238
Back Matter....Pages -
β¦ Subjects
Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; Management of Computing and Information Systems; User Interfaces and Human Computer Interaction
π SIMILAR VOLUMES
<p>WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as chairs in this conference series, which was founded in 2002 and is now emerging as one of the most respected venues for publication of research on pervasive and ubiquitous c- p
<span>This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), held April 19β21, 2006 in York, UK. The conference focused on methods, tools, principles, and practices for assessing and achievingsecurityinapervasiveenvironment.News
<p>nd Welcome to the proceedings of PERVASIVE 2004, the 2 International C- ference on Pervasive Computing and the premier forum for the presentation and appraisal of the most recent and most advanced research results in all - undational and applied areas of pervasive and ubiquitous computing. Consi-
<p>nd Welcome to the proceedings of PERVASIVE 2004, the 2 International C- ference on Pervasive Computing and the premier forum for the presentation and appraisal of the most recent and most advanced research results in all - undational and applied areas of pervasive and ubiquitous computing. Consi-
<P>This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Security in Pervasive Computing held in Boppard, Germany in March 2003. </P><P>The 19 revised full papers presented together with abstracts of 4 invited talks and a workshop summary were carefu