Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: Security and Privacy in Ubiquitous Computing. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

Security and Privacy in Ubiquitous Computing
by Decius at 12:37 am EST, Feb 5, 2003

] Like most information technologies, Mobile and Ubiquitous
] Computing carries a number of security and privacy
] implications. We feel that care should be taken to
] consider these issues when designing Ubicomp systems. In
] this report we will enumerate a number of the privacy
] concerns in Ubicomp and provide a philisophical
] discussion of the importance of addressing these
] problems. In considering these problems we have found
] that a number of Ubicomp techniques are in fact well
] suited to solving security and privacy problems that
] arise in Ubicomp. We will discuss some of these
] techniques in the hope of inspiring further
] consideration. Systems described include a secure RF-ID
] system, an architecture for setting privacy levels based
] on context, and a wearable cryptographic authenticator.

This is probably the coolest paper I've ever written, and for one of the coolest classes I ever took. I'm linking this here because I've had to dig it out of Georgia Tech's site twice now and I figure it ought to be easy to find...


Security and Privacy in Ubiquitous Computing
by Jeremy at 11:39 am EST, Jan 3, 2004

Like most information technologies, Mobile and Ubiquitous Computing carries a number of security and privacy implications. We feel that care should be taken to consider these issues when designing Ubicomp systems. In this report we will enumerate a number of the privacy concerns in Ubicomp and provide a philisophical discussion of the importance of addressing these problems. In considering these problems we have found that a number of Ubicomp techniques are in fact well suited to solving security and privacy problems that arise in Ubicomp. We will discuss some of these techniques in the hope of inspiring further consideration. Systems described include a secure RF-ID system, an architecture for setting privacy levels based on context, and a wearable cryptographic authenticator.

This is an old paper, but Georgia Tech has removed it from the Google index. It can be found in the Wayback machine index, but not displayed from the archive because of the robots.txt exclusion.


 
 
Powered By Industrial Memetics