Delegating secure logging in pervasive computing systems

被引:0
|
作者
Accorsi, Rafael [1 ]
Hohl, Adolf [1 ]
机构
[1] Univ Freiburg, Dept Telemat, Freiburg, Germany
来源
SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS | 2006年 / 3934卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logging is a central service in computing systems. It lays the foundation for accountability and audit services in computing systems, as well as for other accessory services. While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems. In this context, we present two contributions addressing this problem. First, we develop an approach to securely log information in marginally trusted collectors. Second, we investigate the question of how to securely delegate our logging protocol to a relay equipped with trusted-computing modules.
引用
收藏
页码:58 / 72
页数:15
相关论文
共 50 条
  • [31] Context-based secure resource access in pervasive computing environments
    Tripathi, A
    Ahmed, T
    Kulkarni, D
    Kumar, R
    Kashiramka, K
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 159 - 163
  • [32] A trust analysis methodology for pervasive computing systems
    Lo Presti, S
    Butler, M
    Leuschel, M
    Booth, C
    TRUSTING AGENTS FOR TRUSTING ELECTRONIC SOCIETIES: THEORY AND APPLICATIONS IN HCI AND E-COMMERCE, 2005, 3577 : 129 - 143
  • [33] Towards service orientation in pervasive computing systems
    Bellur, U
    Narendra, NC
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 289 - 295
  • [34] Pervasive Computing In Transport Embedded Information Systems
    Marques, Antonio
    Serrano, Manuel
    2009 6TH ANNUAL IEEE COMMUNICATION SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS WORKSHOPS, 2009, : 212 - 214
  • [35] Special issue on Edge Computing in Pervasive Systems
    Cicconetti, Claudio
    de la Oliva, Antonio
    Pompili, Dario
    PERVASIVE AND MOBILE COMPUTING, 2022, 83
  • [36] More principled design of pervasive computing systems
    Dobson, S
    Nixon, P
    ENGINEERING HUMAN COMPUTER INTERACTION AND INTERACTIVE SYSTEMS, 2005, 3425 : 292 - 305
  • [37] Self-healing for Pervasive Computing Systems
    Bourdenas, Themistoklis
    Sloman, Morris
    Lupu, Emil C.
    ARCHITECTING DEPENDABLE SYSTEMS VII, 2010, 6420 : 1 - 25
  • [38] Persistent computing systems as an infrastructure for pervasive services
    Cheng, Jingde
    Goto, Yuichi
    Someya, Masami
    Endo, Takumi
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 104 - +
  • [39] Combining Theory and Systems Building in Pervasive Computing
    Hu, Bo
    Hu, Bin
    Callaghan, Victor
    Lin, Zongkai
    COMPUTER JOURNAL, 2010, 53 (02): : 129 - 130
  • [40] On the relationship of privacy and secure remote logging in dynamic systems
    Accorsi, Rafael
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 329 - 339