Home
        
        Call for Participation 
        Program 
        Outcome 
        Participants 
        Organization   
      
  | 
      
Introduction
ALL Presentations and Papers are Available Online on
the Program Page! 
Ubiquitous Computing seeks to move computers into the background while using
them to enhance human endeavors. Nevertheless, will society accept and
totally trust the security associated with background computational activities?
Are there new security threats to person and property as a consequence of this
successor to interactive computing?  Can we seamlessly leverage current/
classical security concepts and solutions to an augmented world?  Ubiquitous computing security research may
still be considered a "hot topic", as there still remain some open
questions.  This workshop contributes to this field by bringing
together professionals prepared to address and brainstorm over essential themes
related to ubiquitous computing security including: 
 
-  Ubiquity - Who has access to my resources and
  services? Issues for confidentiality, authorization, and access control.
 -  Augmented Reality   – How do we augment our
  risk management strategies to match augmented reality? Furthermore, can we
  exploit augmented reality in risk management?
 -  Context Awareness - Who else knows where I am
  and what’s going on around me? Matters for privacy and controlled
  information access including and beyond location.
 -  Invisible Computer - Who am I interacting with
  and when? Defining suitable authentication and trust frameworks for ubiquitous
  computing.
 -  Smart Items - But they’re so small, can they
  protect themselves and who owns these things anyway? Analysis and
  classification of existing micro crypto-algorithms, as well as issues
  surrounding ownership, accountability, and non-repudiation.
 -  Mobility and Portability – What happens to
  “end-to-end” security? Charting of IT landscapes and architectures
  representative of ubiquitous computing, and specification of goals for
  security.
 -  Security versus the Disappearing Computer – How do we manage
  the tradeoffs presented here? How are the novel disappearing computer
  interaction substrates maintained when security is introduced?
 -  Management of Augmented Environments  –
  Identification of the management issues for ubiquitous systems and proposals
  for tools and utilities.
 -  Social Awareness, Legislation and Education
  – Agreement on what message is to be delivered to society regarding security
  in ubiquitous computing environments, and how.
  
Expected Participants
  - Researchers in Ubiquitous Computing Security will have an opportunity to
    exchange ideas with other active researchers in this field.
 
  - Seasoned experts in Classical Security may transfer their expertise to the
    UbiComp domain of security research.
 
  - Software and hardware engineers of ubiquitous, mobile and embedded systems
    can contribute to discussions regarding real applications and the
    feasibility of proposed security solutions.  They will also be involved
    in generation of further ideas for incorporating security into the design
    process.
 
  - Social Computing practitioners will assist in maintaining a balance
    between technical issues and security requirements for society.
 
  - Business visionaries will also add their expectations for Enterprise-level
    Ubiquitous Computing applications.
 
 
Application of Outcome
        
          - Presentation of outcome to UBICOMP2002
            participants
 
          - Towards a reference model for Ubiquitous Computing
            Security
 
          - Specification of future work in the area of Ubiquitous Computing
            Security
 
          - Further Publication of Workshop outcome
 
         
Contacts
        Refik Molva 
        Institut Eurécom 
        2229 Route des Crêtes, BP
        193, F-06904 Sophia Antipolis 
        Cédex Phone: +33 (0)
        4.93.00.26.12 
        email: molva@eurecom.fr 
        http://www.eurecom.fr/Corporate/Staff/molva.html 
          
        Joachim Posegga
        SAP Corporate Research 
        Vincenz-Priessnitz-Str. 1,
        D-76131, Karlsruhe 
        Phone: +49 721 69020 
        email: joachim.posegga@sap.com 
        http://www.teco.edu/~posegga/ 
          
        Philip Robinson 
        SAP Corporate Research
        & Tele-cooperation Office (TecO) 
        Vincenz-Priessnitz-Str. 1,
        D-76131 Karlsruhe 
        Phone: +49 721 690289 
email: philip@teco.edu 
        http://www.teco.edu/~philip/ 
          
           |