News

Protecting ubiquitous applications: beyond the Byzantine threats model

ShareThis
Posted: 10-06-2007 01:54 | Views: 3304
Important Date: 13-06-2007
[Complete]
image

The speech will be held on Wednesday June 13th, at 18:15 – 19:15 in the Aretaios building (hall 3).


Lecture Abstract

The traditional security model for network applications developed over 30 years ago deals with threats in which the adversary can corrupt a bounded number of components. Although this model is adequate for network systems whose components are of a similar type (but operationally independent), it is not suitable for ubiquitous systems whose components may have very different features and be subject to a variety of constraints such as, power constraints (e.g., battery operated), communication/medium constraints (e.g., wireless) and computational constraints (restricted memory, IC footprint). In addition, some components may share a functionality, e.g., use the same OS, in which case the adversary may succeed in controlling large numbers of components by simply corrupting this functionality (e.g., infecting the OS with a virus).

While the goal of any security model is to provide holistic security, it is important that a dynamic and flexible approach is used.What is needed is a model that will guarantee holistic security if proven secure components are combined in a secure framework. In particular, replacing/adding components (or subsystems) by other proven secure components (subsystems) should not weaken the security of the system, or require a re-evaluation of its security---plug and play security mode.

The talk will focus on such issues including dependent component faults, light crypto tools and Universal Composability issues. We shall consider ubiquitous networks whose components range from RFIDs and sensors to PDAs, laptops, and servers, with topologies that combine fixed with wireless and ad hoc infrastructures (such as mesh networks).

Σχετικά με τον ομιλητή

Mike Burmester, Ph.D., is the Harris Professor of Computer Science at Florida State University, Tallahassee, Florida, and co-director of the SAIT Lab. He graduated from Athens University and received his Ph.D. from the University of Rome (La Sapienza), Italy. He joined the faculty at FSU in 2001 after more than 30 years of research and teaching at leading institutions around the world. Dr. Burmester has published more than 100 research papers in information security. His current research interests include cryptography, network security and ubiquitous applications. He is a fellow of the Institute of Mathematics and its Applications (FIMA), and a member of IEEE Computer Society and the International Association of Cryptological Research (IACR).


Back
Related News
Invitation to the Second Dissemination Event of the Project SusTour [5/4/204]
Posted: 03-04-2024 20:42 | Views: 2047
Important Date: 05-04-2024
[Complete]
Attached files
en  pdf.png  Invitation / Schedule
Size: 564.14 KB :: Type: PDF document
Ionian Contemporary Animation Festival ICONA 2023
Posted: 20-06-2023 17:46 | Views: 4018
Start: 20-06-2023 |End: 08-09-2023
[Complete]
Attached files
en  pdf.png  ICONA 2023 - Rules and Terms
Size: 319.24 KB :: Type: PDF document
DISCUSSIONS FOR THE MUSEUM 2022-2023. Lecture: Museum and well-being!
Posted: 17-02-2023 07:55 | Views: 1635
Start: 17-02-2023 |End: 23-02-2023
[Complete]
<< <
April 2024
> >>
Mo Tu We Th Fr Sa Su
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Today, Sunday 28-04-2024
Easter Wishes 2024
Start: 26-04-2024 |End: 12-05-2024
[In Progress]
StudyInGreece diavgeia eudoxus eua.be magna-charta.org eellak.gr
facebook twitter youtube instagram linkedin viber rss gp as
Text To SpeechText To Speech Text ReadabilityText Readability Color ContrastColor Contrast
Accessibility Options