ISR banner
 
ISR Subtitle Bar

Home  |   People  |   Research  |   Publications  |   Tech Transition  |   Events  |   Partnerships  |   About ISR  |   Contact Us

ISR Reseach Forum 2007 Banner graphic
 

Trust Management and its Importance to Secure Ubiquitous Systems

Students: Mamadou Hassimiou Diallo, UC Irvine/ISR, Jose Romero-Mariona, UC Irvine/ISR

 

Advisor: Thomas A. Alspaugh, UC Irvine/ISR, Debra J. Richardson, UC Irvine/ISR


Abstract: In today’s society which embraces pervasive and ubiquitous computing more and more everyday, different entities that threaten the security of this technology will also expand. We believe that traditional security practices have and will prove to be inefficient when it comes to ubiquitous computing, and present trust management as an alternative. We provide a comprehensive survey that takes us through the two main parts of the paper, security and trust management. Security is described, as well as why ubiquitous systems are different than traditional computing and therefore conventional security measures can not be successfully applied. We also show how trust management can overcome many of traditional security’s shortcomings. Special focus is put into the networking and communications aspect of ubiquitous systems, as we show how trust management can be successfully applied in this area in order to secure it.


Bio:

Mamadou Hassimiou Diallo:
I am a third year Ph.D. student working under professor Thomas A. Alspaugh. My research interest is in software engineering, particularly in the areas of software requirements and software architecture. My main focus is the interplay between requirements and architecture. In addition, I am interested in architectural-based trust management in decentralized peer to peer systems and applications

 

Jose Romero-Mariona:
Jose Romero-Mariona is a third year graduate student involved in the area of software requirements and testing under professor Debra Richardson. Some of his latest work involves looking at how non-functional requirements, security specifically, can be carried over and used at other stages of software development. He is currently working on taking security requirements from architecture to design.