Abstract
We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth cellphone, as an alternative authentication method. We analyse in detail the suitability of several alternatives for the graphical environment and underlying OS and we discuss a variety of interesting implementation issues that arose during development.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alkassar, A., Stüble, C., Sadeghi, A.-R.: Secure object identification—or: solving the Chess Grandmaster Problem. In: NSPW 2003. Proceedings of the 2003 workshop on New security paradigms, pp. 77–85. ACM Press, New York (2003)
Anonymous. Windows XP Technical Overview White Paper (May 2001), http://www.microsoft.com/technet/prodtechnol/winxppro/evaluate/xptechov.mspx
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003. Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164–177. ACM Press, New York (2003), http://www.cl.cam.ac.uk/netos/papers/2003-xensosp.pdf
Beth, T., Desmedt, Y.: Identification Tokens—or: Solving the Chess Grandmaster Problem. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 11–15. Springer, Heidelberg (1991)
Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 302–9743. Springer, Heidelberg (1994), http://link.springer-ny.com/link/service/series/0558/papers/0765/07650344.pdf
Corner, M.D., Noble, B.D.: Zero-Interaction Authentication. In: The Eighth ACM Conference on Mobile Computing and Networking, ACM Press, New York (2002), http://mobility.eecs.umich.edu/papers/mobicom02.pdf
Kilpatrick, D., Salamon, W., Vance, C.: Securing The X Window System With SELinux. Tech. Rep. 03-006, NAI Labs (March 2003), http://www.nsa.gov/selinux/papers/X11_Study.pdf
Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: The 2001 USENIX Annual Technical Conference, USENIX Association (2001)
Richardson, T., Bennett, F., Hopper, A.: Teleporting in an X Window System Environment. IEEE Personal Communications Magazine 1(3), 6–12 (1994), http://www.uk.research.att.com/pub/docs/att/tr.94.4.ps.Z
Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing 2(1), 33–38 (1998), http://www.uk.research.att.com/pub/docs/att/tr.98.1.pdf
Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. CryptoBytes 7(1), 17–29 (2004)
Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002), http://www-lce.eng.cam.ac.uk/fms27/secubicomp/
Stajano, F.: One user, many hats; and, sometimes, no hat—towards a secure yet usable PDA. In: The Twelfth International Workshop on Security Protocols (to appear), http://www-lce.eng.cam.ac.uk/fms27/papers/2004-stajano-hats.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johnson, M., Stajano, F. (2007). Implementing a Multi-hat PDA. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2005. Lecture Notes in Computer Science, vol 4631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77156-2_37
Download citation
DOI: https://doi.org/10.1007/978-3-540-77156-2_37
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77155-5
Online ISBN: 978-3-540-77156-2
eBook Packages: Computer ScienceComputer Science (R0)