DocumentCode :
755751
Title :
Minimizing security risks in ubicomp systems
Author :
Hong, Jason I.
Author_Institution :
Sch. of Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, USA
Volume :
38
Issue :
12
fYear :
2005
Firstpage :
118
Lastpage :
119
Abstract :
In the Internet´s early days, few people foresaw the emergence of spam, phishing schemes, and malware such as viruses, worms, Trojan horses, spyware, and key loggers that plague users today. It´s safe to assume that ubicomp technologies will suffer from the same sorts of unforeseen vulnerabilities that have plagued the Internet. We can´t account for every possible security and privacy risk in ubiquitous computing systems. We can, however, design such systems to reduce the burden on users as well as develop better security models and interaction techniques to prevent and minimize foreseeable threats.
Keywords :
data privacy; human computer interaction; risk management; security of data; ubiquitous computing; Internet; Trojan horses; computer viruses; interaction technique; key logger; malware; phishing scheme; privacy risk; security risk minimization; spam emergence; spyware; ubicomp system; ubiquitous computing system; worms; Biometrics; Data security; Fingerprint recognition; Intelligent networks; Personal digital assistants; Pervasive computing; Portable computers; Privacy; User interfaces; Wireless networks; Invisible computing; Mobile devices; Security; Wireless networks;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2005.416
Filename :
1556497
Link To Document :
بازگشت