Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work...
-
Upload
byron-fletcher -
Category
Documents
-
view
215 -
download
0
Transcript of Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work...
Midterm Presentation
iSecurity Project Team
Presentation Contents
Background Goal Project work breakdown The work so far Future targets User Perspective Summary Questions
Background
Joint project between KTH and Stanford University
Built upon the Interactive Workspace project Security in an interactive environment
External goal
External Goals– Design a social model– Augment the existing iSpace infrastructure with
the iSecurity system.– Implement simple auditing tools
Internal Goals
Internal Goals– To gain an understanding of ubiquitous computing
environment – To gain experience working in an international
team– Exposure to software engineering and system
design issues– To learn team management skills
Project work breakdown
Study
Social Model Development
System Design
Implementation & Testing
Evaluation
System Documentation
Complete the Final Deliverables
The work so far
What have been done so far– Completion of Study Phase– Completion of Social Model Development– Completion of the System Design
Future targets
Implementation– Developing a secure Event Heap– Developing applications so that we can test the
new secure Event Heap Testing our system Evaluation of the system Writing the final technical report Completion of the final deliverables
User perspective
Whointeracting with and when
Wherethe users and items
Which services they can provide and I can get
Summary
• Joint project between KTH and Stanford University
• A new and very interesting area• There are differences between “classic”
security and ubiquitous computing security• Lesson learnt
Questions
For further information about this project please visit our homepage:
http://csd.ssvl.kth.se/~csd2003-team16/index.htm
”A central event dispatcher, all the message goes through the event heap server.”
Event Heap
ME
CH
AN
ISM
S
SOCIAL MODEL
OBJECTIVES
So
cial
Asp
ects
Social Model Development
Mechanisms
Component Security Objective Satisfied
GatekeeperBounded EnvironmentIntegrityPrivacyAvailabilityAccountability
Trust GroupsCustomizabilityConvenienceManageability
Security Policy DefinitionIntegrityCustomizability
AuthenticationBounded EnvironmentIntegrityAccountability
Privacy Guarantee Enforcement Privacy
Table 1: Components and Satisfied Objectives
Ubiquitous computing environment
Invisible Computers anywhereSmart Everyday ItemsEvery computer for every oneEtc..