Midterm Presentation. iSecurity Project Team Presentation Contents Background Goal Project work...

Preview:

Citation preview

Midterm Presentation

iSecurity Project Team

Presentation Contents

Background Goal Project work breakdown The work so far Future targets User Perspective Summary Questions

Background

Joint project between KTH and Stanford University

Built upon the Interactive Workspace project Security in an interactive environment

External goal

External Goals– Design a social model– Augment the existing iSpace infrastructure with

the iSecurity system.– Implement simple auditing tools

Internal Goals

Internal Goals– To gain an understanding of ubiquitous computing

environment – To gain experience working in an international

team– Exposure to software engineering and system

design issues– To learn team management skills

Project work breakdown

Study

Social Model Development

System Design

Implementation & Testing

Evaluation

System Documentation

Complete the Final Deliverables

The work so far

What have been done so far– Completion of Study Phase– Completion of Social Model Development– Completion of the System Design

Future targets

Implementation– Developing a secure Event Heap– Developing applications so that we can test the

new secure Event Heap Testing our system Evaluation of the system Writing the final technical report Completion of the final deliverables

User perspective

Whointeracting with and when

Wherethe users and items

Which services they can provide and I can get

Summary

• Joint project between KTH and Stanford University

• A new and very interesting area• There are differences between “classic”

security and ubiquitous computing security• Lesson learnt

Questions

For further information about this project please visit our homepage:

http://csd.ssvl.kth.se/~csd2003-team16/index.htm

”A central event dispatcher, all the message goes through the event heap server.”

Event Heap

ME

CH

AN

ISM

S

SOCIAL MODEL

OBJECTIVES

So

cial

Asp

ects

Social Model Development

Mechanisms

Component Security Objective Satisfied

GatekeeperBounded EnvironmentIntegrityPrivacyAvailabilityAccountability

Trust GroupsCustomizabilityConvenienceManageability

Security Policy DefinitionIntegrityCustomizability

AuthenticationBounded EnvironmentIntegrityAccountability

Privacy Guarantee Enforcement Privacy

Table 1: Components and Satisfied Objectives

Ubiquitous computing environment

Invisible Computers anywhereSmart Everyday ItemsEvery computer for every oneEtc..