首页> 外文会议>IEEE International Conference on Pervasive Services >Security in Pervasive Computing - Calling for new Security Principles
【24h】

Security in Pervasive Computing - Calling for new Security Principles

机译:普及计算中的安全 - 呼吁新的安全原则

获取原文
获取外文期刊封面目录资料

摘要

UNTIL recently the world of computing and communications was simple and easy. Enterprise IT infrastructures were protected according to the so-called perimeter security model: its principle is to implement security at the network level using firewalls (see e.g. [2]), intrusion detection systems (e.g. Bro [8] and snort [9]), etc. Enterprises are turned into fortresses by building network walls to separate trustworthy and less trustworthy parts of the network; security is managed and enforced at the corresponding network borders. To a certain extent, this model may even cater with the changing working style; e.g., a mobile workforce using mobile devices for accessing corporate servers and databases to perform their daily business tasks. However, the security perimeter model does not work in a world of pervasive computing where interactions across enterprise domain boarders is the rule and not the exception. With pervasive computing we may envision scenarios where mobile devices host each and every application and the respective data but as well where applications and data are shared among mobile devices that belong to various administrative domains. To an extreme, a user may even download his applications and data onto a device in his surrounding, execute the application thereon and get the results back to his own device; without leaving any of his personal data on the device being used (this property is called oblivion [11]).
机译:直到最近,计算和通信世界简单且容易。企业IT基础架构根据所谓的周边安全模型保护:其原理是使用防火墙在网络级实施安全性(参见例如[2]),入侵检测系统(例如兄弟[8]和Snort [9])等等,企业通过建设网络墙来分离网络墙,以分离网络的可靠性和不值得信赖的部分;在相应的网络边框上管理和强制管理安全性。在一定程度上,这种模型甚至可以满足不断变化的工作方式;例如,使用移动设备访问公司服务器和数据库的移动劳动力,以执行日常业务任务。但是,安全周长模型在普遍计算的世界中不起作用,其中跨企业域库的交互是规则而不是异常。通过普遍计算,我们可以设想移动设备主持每个应用程序和各个应用程序和各个数据的场景,而且还可以在属于各种管理域属于各种管理域的移动设备之间共享应用程序和数据。对于极端,用户甚至可以将他的应用程序和数据下载到他周围的设备上,在其上执行应用程序并将结果返回他自己的设备;在不留在所使用的设备上的任何个人数据(此属性被称为遗忘[11])。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号