Presentation is loading. Please wait.

Presentation is loading. Please wait.

Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective.

Similar presentations


Presentation on theme: "Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective."— Presentation transcript:

1 Midterm Presentation

2 iSecurity Project Team

3 Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective Summary Questions

4 Background Joint project between KTH and Stanford University Built upon the Interactive Workspace projectInteractive Workspace Security in an interactive environment

5 External goal External Goals – Design a social model – Augment the existing iSpace infrastructure with the iSecurity system. – Implement simple auditing tools

6 Internal Goals – To gain an understanding of ubiquitous computing environment – To gain experience working in an international team – Exposure to software engineering and system design issues – To learn team management skills

7 Project work breakdown Study Social Model Development System Design Implementation & Testing Evaluation System Documentation Complete the Final Deliverables

8 The work so far What have been done so far – Completion of Study Phase – Completion of Social Model Development Completion of Social Model Development – Completion of the System Design

9 Future targets Implementation – Developing a secure Event Heap – Developing applications so that we can test the new secure Event Heap Testing our system Evaluation of the system Writing the final technical report Completion of the final deliverables

10 User perspective Who interacting with and when Where the users and items Which services they can provide and I can get

11 Summary Joint project between KTH and Stanford University A new and very interesting area There are differences between “classic” security and ubiquitous computing security Lesson learnt

12 Questions For further information about this project please visit our homepage: http://csd.ssvl.kth.se/~csd2003-team16/index.htm

13 ”A central event dispatcher, all the message goes throughthe event heap server.” Event Heap

14 MECHANISMS SOCIAL MODEL OBJECTIVES Social Aspects Social Model Development

15 Mechanisms Component Security Objective Satisfied Gatekeeper  Bounded Environment  Integrity  Privacy  Availability  Accountability Trust Groups  Customizability  Convenience  Manageability Security Policy Definition  Integrity  Customizability Authentication  Bounded Environment  Integrity  Accountability Privacy Guarantee Enforcement  Privacy Table 1: Components and Satisfied Objectives

16 Ubiquitous computing environment Invisible Computers anywhere Smart Everyday Items Every computer for every one Etc..

17


Download ppt "Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective."

Similar presentations


Ads by Google