Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

A Secure Pervasive Environment

McLean, P.G.

    This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. The chosen environment is built around a shared space containing a classified network. Since access to the classified network is only available to people once they are in this space, we investigate what is required to ensure only authorised people can enter, which highlights problems inherent in any kind of physical access control, and then how to carry this through to manage their access to information once inside the space. A layered agent architecture is considered, using real time devices such as biometric mechanisms, door actuators and a smart card reader acting as the lower level agents. These agents are then wrapped in software allowing them to communicate with higher level agents that through the coordination of these low level agents control the security of the pervasive environment. Security is further enhanced, by preventing the classified network from communicating with the network containing the biometric devices and databases. We also consider the security implications of using paper documents within the shared space, as well as the possibility of any other devices that could potentially be used for smuggling information out of the environment.
Cite as: McLean, P.G. (2003). A Secure Pervasive Environment. In Proc. First Australasian Information Security Workshop (AISW2003), Adelaide, Australia. CRPIT, 21. Johnson, C., Montague, P. and Steketee, C., Eds. ACS. 67-75.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007