2005 | OriginalPaper | Buchkapitel
Look Who’s Talking – Authenticating Service Access Points
verfasst von : Adolf Hohl, Lutz Lowis, Alf Zugenmaier
Erschienen in: Security in Pervasive Computing
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Pervasive computing can be divided into computing on personal wearable devices and computing in a smart infrastructure. When a wearable device communicates personal data for further processing to the infrastructure, privacy concerns arise. These concerns would be unnecessary if the behavior of services in the smart environment could be authenticated and known to be compliant to given policies. Based upon the Trusted Computing idea, we present a solution to the specific problem of service access point authentication. In contrast to previous approaches, this operating system centric approach does not only handle trusted computing enhanced applications but also deals with legacy applications providing services.