Midterm Presentation
iSecurity Project Team
Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective Summary Questions
Background Joint project between KTH and Stanford University Built upon the Interactive Workspace projectInteractive Workspace Security in an interactive environment
External goal External Goals – Design a social model – Augment the existing iSpace infrastructure with the iSecurity system. – Implement simple auditing tools
Internal Goals – To gain an understanding of ubiquitous computing environment – To gain experience working in an international team – Exposure to software engineering and system design issues – To learn team management skills
Project work breakdown Study Social Model Development System Design Implementation & Testing Evaluation System Documentation Complete the Final Deliverables
The work so far What have been done so far – Completion of Study Phase – Completion of Social Model Development Completion of Social Model Development – Completion of the System Design
Future targets Implementation – Developing a secure Event Heap – Developing applications so that we can test the new secure Event Heap Testing our system Evaluation of the system Writing the final technical report Completion of the final deliverables
User perspective Who interacting with and when Where the users and items Which services they can provide and I can get
Summary Joint project between KTH and Stanford University A new and very interesting area There are differences between “classic” security and ubiquitous computing security Lesson learnt
Questions For further information about this project please visit our homepage:
”A central event dispatcher, all the message goes throughthe event heap server.” Event Heap
MECHANISMS SOCIAL MODEL OBJECTIVES Social Aspects Social Model Development
Mechanisms Component Security Objective Satisfied Gatekeeper Bounded Environment Integrity Privacy Availability Accountability Trust Groups Customizability Convenience Manageability Security Policy Definition Integrity Customizability Authentication Bounded Environment Integrity Accountability Privacy Guarantee Enforcement Privacy Table 1: Components and Satisfied Objectives
Ubiquitous computing environment Invisible Computers anywhere Smart Everyday Items Every computer for every one Etc..