Security for whom? the shifting security assumptions of pervasive computing

10Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Pervasive computing will introduce hundreds of computing devices per user. This change is of such magnitude that it is qualitative as well as quantitative. Old solutions may not scale when the size of the problem grows by such a factor - passwords, for example, will no longer be a suitable user authentication method. In this paper we examine new security issues for pervasive computing including authentication, biometrics and digital rights management. But the potential impact of pervasive computing on society is such that we have a responsibility to look further than just the technical issues. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Stajano, F. (2003). Security for whom? the shifting security assumptions of pervasive computing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2609, 16–27. https://doi.org/10.1007/3-540-36532-x_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free