1st International ICST Workshop on Trusted Collaboration

Research Article

A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing

  • @INPROCEEDINGS{10.1109/COLCOM.2006.361883,
        author={William Claycomb and Dongwan Shin},
        title={A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing},
        proceedings={1st International ICST Workshop on Trusted Collaboration},
        publisher={IEEE},
        proceedings_a={TRUSTCOL},
        year={2007},
        month={5},
        keywords={Access control Bluetooth Collaboration Computer science Computer security Information security Mobile computing Pervasive computing Processor scheduling Secure storage},
        doi={10.1109/COLCOM.2006.361883}
    }
    
  • William Claycomb
    Dongwan Shin
    Year: 2007
    A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing
    TRUSTCOL
    IEEE
    DOI: 10.1109/COLCOM.2006.361883
William Claycomb1,*, Dongwan Shin1,*
  • 1: Computer Science Department, New Mexico Tech, Socorro, NM 87801
*Contact email: billc@nmt.edu, doshin@nmt.edu

Abstract

Impromptu collaboration, often characterized as being opportunistic, spontaneous, proximity-based, and transient, is fast becoming a common way of interactions in mobile and pervasive computing. Though continued research efforts have been made to secure this type of collaboration, the increasing computational and storage capabilities of mobile devices pose a new security challenge of access control for sharing a variety of their resources. In this paper we present a visual framework for securing impromptu collaboration in a pervasive computing environment. The framework incorporates a method of demonstrative identification of mobile devices, key-based capability list, and 2-dimensional visual barcode technology to support a convenient access control service in mobile and pervasive computing. Impromptu collaboration, often characterized as being opportunistic, spontaneous, proximity-based, and transient, is fast becoming a common way of interactions in mobile and pervasive computing. Though continued research efforts have been made to secure this type of collaboration, the increasing computational and storage capabilities of mobile devices pose a new security challenge of access control for sharing a variety of their resources. In this paper we present a visual framework for securing impromptu collaboration in a pervasive computing environment. The framework incorporates a method of demonstrative identification of mobile devices, key-based capability list, and 2-dimensional visual barcode technology to support a convenient access control service in mobile and pervasive computing.