Information seesaw: availability vs. security management in the UbiComp world

SECURE DATA MANAGEMENT, PROCEEDINGS(2005)

引用 3|浏览2
暂无评分
摘要
The ubiquitous computing vision brings about a number of information security and privacy challenges, some of which we already face in the mobile computing arena. This work focuses on a context-specific class of information leakage threats not involving a malicious custodian. Information exposure threats arise as a side effect of a particular choice of data management procedures employed during legitimate information use or possession in a specific context. They affect, in different forms, information throughout its lifetime in a ubiquitous computing environment. To maximize information availability, and thus its value to user, under unpredictably varying threat models, we depart form static and inflexible approaches to secure data management to provide for continuous and adaptive information exposure protection. We outline a means of structured reasoning about information exposure and introduce a metric for its quantification. An approach to threat mitigating information management operations discrimination based on information utility change is also presented. To unify the introduced concepts into a coherent big picture we form a Levels of Exposure model. On the implementation side, we overview a type aware, sub-file granularity data repository system that meets the requirements implied in the paper.
更多
查看译文
关键词
information exposure,information availability,information leakage threat,information seesaw,information security,ubicomp world,data management,security management,information exposure threat,threat mitigating information management,adaptive information exposure protection,legitimate information use,information utility change,mobile computer,ubiquitous computing,side effect,information management
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要