Pervasive computing will introduce hundreds of computing devices per user. This change is of such magnitude that it is qualitative as well as quantitative. Old solutions may not scale when the size of the problem grows by such a factor - passwords, for example, will no longer be a suitable user authentication method. In this paper we examine new security issues for pervasive computing including authentication, biometrics and digital rights management. But the potential impact of pervasive computing on society is such that we have a responsibility to look further than just the technical issues. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Stajano, F. (2003). Security for whom? the shifting security assumptions of pervasive computing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2609, 16–27. https://doi.org/10.1007/3-540-36532-x_2
Mendeley helps you to discover research relevant for your work.