Delegating secure logging in pervasive computing systems

被引:0
|
作者
Accorsi, Rafael [1 ]
Hohl, Adolf [1 ]
机构
[1] Univ Freiburg, Dept Telemat, Freiburg, Germany
来源
SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS | 2006年 / 3934卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Logging is a central service in computing systems. It lays the foundation for accountability and audit services in computing systems, as well as for other accessory services. While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems. In this context, we present two contributions addressing this problem. First, we develop an approach to securely log information in marginally trusted collectors. Second, we investigate the question of how to securely delegate our logging protocol to a relay equipped with trusted-computing modules.
引用
收藏
页码:58 / 72
页数:15
相关论文
共 50 条
  • [41] At what cost pervasive? A social computing view of mobile computing systems
    Dryer, DC
    Eisbach, C
    Ark, WS
    IBM SYSTEMS JOURNAL, 1999, 38 (04) : 652 - 676
  • [42] Delegating mechanism resolution in distributed computing
    Yan, Jun-Yong
    Dalian Ligong Daxue Xuebao/Journal of Dalian University of Technology, 2003, 43 (SUPPL.): : 107 - 110
  • [43] IMPLEMENTATION OF PERVASIVE COMPUTING BASED HIGH-SECURE SMART HOME SYSTEM
    Ventylees, Raj S.
    2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 195 - 202
  • [44] An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments
    Sharmin, Moushumi
    Ahmed, Shameem
    Ahamed, Sheikh I.
    PERCOM 2006: FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 258 - +
  • [45] Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
    Ahamed, Sheikh Iqbal
    Li, Haifeng
    Talukder, Nilothpal
    Monjur, Mehrab
    Hasan, Chowdhury Sharif
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (10) : 1657 - 1677
  • [46] Private and Secure Service Discovery via Progressive Approach in Pervasive Computing Environments
    Durga, S.
    Salaja, S.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 71 - 77
  • [47] A trust-based secure service discovery (TSSD) model for pervasive computing
    Ahamed, Sheikh I.
    Sharmin, Moushumi
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4281 - 4293
  • [48] NOMA-Based Pervasive Edge Computing: Secure Power Allocation for IoV
    Pei, Xinyue
    Yu, Hua
    Wang, Xiaojie
    Chen, Yingyang
    Wen, Miaowen
    Wu, Yik-Chung
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (07) : 5021 - 5030
  • [49] Delegating a Pairing Can Be Both Secure and Efficient
    Canard, Sebastien
    Devigne, Julien
    Sanders, Olivier
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2014, 2014, 8479 : 549 - 565
  • [50] XML systems for intelligent management of pervasive computing resources
    Alexopoulos, Dimitris
    Kormentzas, George
    Soldatos, John
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, 2006, 204 : 245 - +