Workshop on Security in Ubiquitous Computing

UBICOMP 2002, Göteborg Sweden

Sept 29th, 10h00 - 17h00


Call for Participation






ALL Presentations and Papers are Available Online on the Program Page!

Ubiquitous Computing seeks to move computers into the background while using them to enhance human endeavors. Nevertheless, will society accept and totally trust the security associated with background computational activities? Are there new security threats to person and property as a consequence of this successor to interactive computing?  Can we seamlessly leverage current/ classical security concepts and solutions to an augmented world?  Ubiquitous computing security research may still be considered a "hot topic", as there still remain some open questions.  This workshop contributes to this field by bringing together professionals prepared to address and brainstorm over essential themes related to ubiquitous computing security including: 

  1. Ubiquity - Who has access to my resources and services? Issues for confidentiality, authorization, and access control.
  2. Augmented Reality – How do we augment our risk management strategies to match augmented reality? Furthermore, can we exploit augmented reality in risk management?
  3. Context Awareness - Who else knows where I am and what’s going on around me? Matters for privacy and controlled information access including and beyond location.
  4. Invisible Computer - Who am I interacting with and when? Defining suitable authentication and trust frameworks for ubiquitous computing.
  5. Smart Items - But they’re so small, can they protect themselves and who owns these things anyway? Analysis and classification of existing micro crypto-algorithms, as well as issues surrounding ownership, accountability, and non-repudiation.
  6. Mobility and Portability – What happens to “end-to-end” security? Charting of IT landscapes and architectures representative of ubiquitous computing, and specification of goals for security.
  7. Security versus the Disappearing Computer – How do we manage the tradeoffs presented here? How are the novel disappearing computer interaction substrates maintained when security is introduced?
  8. Management of Augmented Environments – Identification of the management issues for ubiquitous systems and proposals for tools and utilities.
  9. Social Awareness, Legislation and Education – Agreement on what message is to be delivered to society regarding security in ubiquitous computing environments, and how.

Expected Participants

  • Researchers in Ubiquitous Computing Security will have an opportunity to exchange ideas with other active researchers in this field.
  • Seasoned experts in Classical Security may transfer their expertise to the UbiComp domain of security research.
  • Software and hardware engineers of ubiquitous, mobile and embedded systems can contribute to discussions regarding real applications and the feasibility of proposed security solutions.  They will also be involved in generation of further ideas for incorporating security into the design process.
  • Social Computing practitioners will assist in maintaining a balance between technical issues and security requirements for society.
  • Business visionaries will also add their expectations for Enterprise-level Ubiquitous Computing applications.

Application of Outcome

  • Presentation of outcome to UBICOMP2002 participants
  • Towards a reference model for Ubiquitous Computing Security
  • Specification of future work in the area of Ubiquitous Computing Security
  • Further Publication of Workshop outcome


Refik Molva

Institut Eurécom

2229 Route des Crêtes, BP 193, F-06904 Sophia Antipolis

Cédex Phone: +33 (0)



Joachim Posegga

SAP Corporate Research

Vincenz-Priessnitz-Str. 1, D-76131, Karlsruhe

Phone: +49 721 69020



Philip Robinson

SAP Corporate Research & Tele-cooperation Office (TecO)

Vincenz-Priessnitz-Str. 1, D-76131 Karlsruhe

Phone: +49 721 690289




|Home| |Call for Participation| |Program| |Proceedings| |Participants| |Organization|