Abstract
Technological progress allows us to equip any mobile phone with new functionalities, such as storing personalized information about its owner and using the corresponding personal profile for enabling communication to persons whose mobile phones represent similar profiles. However, this raises very specific security issues, in particular relating to the use of Bluetooth technology. Herein we consider such scenarios and related problems in privacy and security matters. We analyze in which respect certain design approaches may fail or succeed at solving these problems. We concentrate on methods for designing the user-related part of the communication service appropriately in order to enhance confidentiality.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Brown, P., Burleson, W., Lamming, M., Rahlff, O.-W., Romano, G., Scholtz, J., Snowdon, D.: Context-awareness: some compelling applications. In: Proceedings of the 2nd International Symposium on Handheld and Ubiquitous Computing (2000)
Cybenko, G., Giani, A., Thompson, P.: Cognitive hacking: A battle for the mind. IEEE Computer 35(8), 50–56 (2002)
Ferscha, A., Hechinger, M., Mayrhofer, R., Rocha, M.d.S., Franz, M., Oberhauser, R.: Digital aura. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001. Springer, Heidelberg (2004)
Ferscha, A., Hechinger, M., Mayrhofer, R., Oberhauser, R.: A light-weight component model for peer-to-peer applications. In: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, pp. 520–527. IEEE Computer Society, Los Alamitos (2004)
Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.): Security in Pervasive Computing (revised papers). LNCS, vol. 2802. Springer, Heidelberg (2004)
Klein, B., Agne, S., Ebert, A., Bender, M.: Enabling flow: A paradigm for document-centered personal information spaces. In: Proceedings of the 8th IASTED International Conference on Artificial Intelligence and Soft Computing (2004)
Kvarnström, H., Hedbom, H., Jonsson, E.: Protecting security policies in ubiquitous environments using one-way functions. In: Hutter et al.[5], pp. 71–85
PAMPAS consortium and constituency. Deliverable D04: Final roadmap (extended version). Technical Report IST-201-37763, PAMPAS consortium (2004)
Robinson, P., Beigl, M.: Trust context spaces: An infrastructure for pervasive security in context-aware environments. In: Hutter et al.[5],pp. 157–172
Smith, I., LaMarca, A., Consolvo, S., Dourish, P.: A social approach to privacy in location-enhanced computing. In: Proceedings of the Workshop on Security and Privacy in Pervasive Computing (2004)
Weiser, M., Gold, R., Brown, J.S.: The origins of ubiquitous computing research at PARC in the late 1980s. IBM Systems Journal 38(4), 693–696 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Klein, B., Miller, T., Zilles, S. (2005). Security Issues for Pervasive Personalized Communication Systems. In: Hutter, D., Ullmann, M. (eds) Security in Pervasive Computing. SPC 2005. Lecture Notes in Computer Science, vol 3450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-32004-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-32004-3_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25521-5
Online ISBN: 978-3-540-32004-3
eBook Packages: Computer ScienceComputer Science (R0)