Download presentation
Presentation is loading. Please wait.
Published byByron Fletcher Modified over 9 years ago
1
Midterm Presentation
2
iSecurity Project Team
3
Presentation Contents Background Goal Project work breakdown The work so far Future targets User Perspective Summary Questions
4
Background Joint project between KTH and Stanford University Built upon the Interactive Workspace projectInteractive Workspace Security in an interactive environment
5
External goal External Goals – Design a social model – Augment the existing iSpace infrastructure with the iSecurity system. – Implement simple auditing tools
6
Internal Goals – To gain an understanding of ubiquitous computing environment – To gain experience working in an international team – Exposure to software engineering and system design issues – To learn team management skills
7
Project work breakdown Study Social Model Development System Design Implementation & Testing Evaluation System Documentation Complete the Final Deliverables
8
The work so far What have been done so far – Completion of Study Phase – Completion of Social Model Development Completion of Social Model Development – Completion of the System Design
9
Future targets Implementation – Developing a secure Event Heap – Developing applications so that we can test the new secure Event Heap Testing our system Evaluation of the system Writing the final technical report Completion of the final deliverables
10
User perspective Who interacting with and when Where the users and items Which services they can provide and I can get
11
Summary Joint project between KTH and Stanford University A new and very interesting area There are differences between “classic” security and ubiquitous computing security Lesson learnt
12
Questions For further information about this project please visit our homepage: http://csd.ssvl.kth.se/~csd2003-team16/index.htm
13
”A central event dispatcher, all the message goes throughthe event heap server.” Event Heap
14
MECHANISMS SOCIAL MODEL OBJECTIVES Social Aspects Social Model Development
15
Mechanisms Component Security Objective Satisfied Gatekeeper Bounded Environment Integrity Privacy Availability Accountability Trust Groups Customizability Convenience Manageability Security Policy Definition Integrity Customizability Authentication Bounded Environment Integrity Accountability Privacy Guarantee Enforcement Privacy Table 1: Components and Satisfied Objectives
16
Ubiquitous computing environment Invisible Computers anywhere Smart Everyday Items Every computer for every one Etc..
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.