Skip to main content

Implementing a Multi-hat PDA

  • Conference paper
Security Protocols (Security Protocols 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4631))

Included in the following conference series:

  • 433 Accesses

Abstract

We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth cellphone, as an alternative authentication method. We analyse in detail the suitability of several alternatives for the graphical environment and underlying OS and we discuss a variety of interesting implementation issues that arose during development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alkassar, A., Stüble, C., Sadeghi, A.-R.: Secure object identification—or: solving the Chess Grandmaster Problem. In: NSPW 2003. Proceedings of the 2003 workshop on New security paradigms, pp. 77–85. ACM Press, New York (2003)

    Chapter  Google Scholar 

  2. Anonymous. Windows XP Technical Overview White Paper (May 2001), http://www.microsoft.com/technet/prodtechnol/winxppro/evaluate/xptechov.mspx

  3. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003. Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164–177. ACM Press, New York (2003), http://www.cl.cam.ac.uk/netos/papers/2003-xensosp.pdf

    Chapter  Google Scholar 

  4. Beth, T., Desmedt, Y.: Identification Tokens—or: Solving the Chess Grandmaster Problem. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 11–15. Springer, Heidelberg (1991)

    Google Scholar 

  5. Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 302–9743. Springer, Heidelberg (1994), http://link.springer-ny.com/link/service/series/0558/papers/0765/07650344.pdf

    Google Scholar 

  6. Corner, M.D., Noble, B.D.: Zero-Interaction Authentication. In: The Eighth ACM Conference on Mobile Computing and Networking, ACM Press, New York (2002), http://mobility.eecs.umich.edu/papers/mobicom02.pdf

    Google Scholar 

  7. Kilpatrick, D., Salamon, W., Vance, C.: Securing The X Window System With SELinux. Tech. Rep. 03-006, NAI Labs (March 2003), http://www.nsa.gov/selinux/papers/X11_Study.pdf

  8. Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: The 2001 USENIX Annual Technical Conference, USENIX Association (2001)

    Google Scholar 

  9. Richardson, T., Bennett, F., Hopper, A.: Teleporting in an X Window System Environment. IEEE Personal Communications Magazine 1(3), 6–12 (1994), http://www.uk.research.att.com/pub/docs/att/tr.94.4.ps.Z

    Article  Google Scholar 

  10. Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing 2(1), 33–38 (1998), http://www.uk.research.att.com/pub/docs/att/tr.98.1.pdf

    Article  Google Scholar 

  11. Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. CryptoBytes 7(1), 17–29 (2004)

    Google Scholar 

  12. Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002), http://www-lce.eng.cam.ac.uk/fms27/secubicomp/

    Google Scholar 

  13. Stajano, F.: One user, many hats; and, sometimes, no hat—towards a secure yet usable PDA. In: The Twelfth International Workshop on Security Protocols (to appear), http://www-lce.eng.cam.ac.uk/fms27/papers/2004-stajano-hats.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bruce Christianson Bruno Crispo James A. Malcolm Michael Roe

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Johnson, M., Stajano, F. (2007). Implementing a Multi-hat PDA. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2005. Lecture Notes in Computer Science, vol 4631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77156-2_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77156-2_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77155-5

  • Online ISBN: 978-3-540-77156-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics