Security in Pervasive Computing | Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings | ISBN 9783540255215

Security in Pervasive Computing

Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings

herausgegeben von Dieter Hutter und Markus Ullmann
Mitwirkende
Herausgegeben vonDieter Hutter
Herausgegeben vonMarkus Ullmann
Buchcover Security in Pervasive Computing  | EAN 9783540255215 | ISBN 3-540-25521-4 | ISBN 978-3-540-25521-5

Security in Pervasive Computing

Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings

herausgegeben von Dieter Hutter und Markus Ullmann
Mitwirkende
Herausgegeben vonDieter Hutter
Herausgegeben vonMarkus Ullmann

Inhaltsverzeichnis

  • Invited Talk (Abstract).
  • Pervasive Computing – A Case for the Precautionary Principle?.
  • Session 1: Smart Devices and Applications.
  • TENeT: A Framework for Distributed Smartcards.
  • P2P Digital Value Fair Trading System Using Smart Cards.
  • “Devices Are People Too” Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example.
  • Securing Ad Hoc Networks.
  • Session 2: Short Paper Session.
  • Secure Identity Management for Pseudo-Anonymous Service Access.
  • Security Issues for Pervasive Personalized Communication Systems.
  • Safeguards in a World of Ambient Intelligence.
  • Session 3: Authentication (I).
  • Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment.
  • Security Concept of the EU-Passport.
  • Session 4: Authentication (II).
  • Efficient Cooperative Signatures: A Novel Authentication Scheme for Sensor Networks.
  • Ephemeral Pairing on Anonymous Networks.
  • EPC Technology.
  • Session 5: Authentication (III).
  • Exploiting Empirical Engagement in Authentication Protocol Design.
  • Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.
  • Look Who’s Talking – Authenticating Service Access Points.
  • Security Issues of Mobile Devices.
  • Session 6: Privacy and Anonymity.
  • Privacy for Profitable Location Based Services.
  • On the Anonymity of Periodic Location Samples.
  • Session 7: Access Control and Information Flow.
  • A Theorem Proving Approach to Analysis of Secure Information Flow.
  • An Efficient Access Control Model for Mobile Ad-Hoc Communities.
  • TrustAC: Trust-Based Access Control for Pervasive Devices.