gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/antont-wireless_security...


From: Toni Alatalo
Subject: [Gzz-commits] gzz/Documentation/misc/antont-wireless_security...
Date: Thu, 06 Mar 2003 06:37:22 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Toni Alatalo <address@hidden>   03/03/06 06:37:21

Modified files:
        Documentation/misc/antont-wireless_security: data_ubiquity 

Log message:
        tested sketching to a more general article (storm among others..)

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/antont-wireless_security/data_ubiquity.diff?tr1=1.2&tr2=1.3&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/antont-wireless_security/data_ubiquity
diff -u gzz/Documentation/misc/antont-wireless_security/data_ubiquity:1.2 
gzz/Documentation/misc/antont-wireless_security/data_ubiquity:1.3
--- gzz/Documentation/misc/antont-wireless_security/data_ubiquity:1.2   Wed Mar 
 5 15:38:53 2003
+++ gzz/Documentation/misc/antont-wireless_security/data_ubiquity       Thu Mar 
 6 06:37:19 2003
@@ -1,3 +1,13 @@
+=============================
+Enabling Secure Data Ubiquity: 
+(meeting the requirements of the wireless and mobile communications)
+=============================
+
+Abstract
+========
+
+..
+
 Introduction
 ============
 
@@ -15,34 +25,48 @@
 in order to have data ubiquity
 new solutions for improving data mobility are needed.
 
-there are also general problems in data mobility 
+(there are also general problems in data mobility 
 related to relationships management, (in other words,) i.e. hypermedia.
 for example, when data is moved there may be difficulties in locating it
-(e.g. links to URLs break). [refs?]
+(e.g. links to URLs break). [refs?])
 
-an approach to improving data mobility is presented in [fallenstein03storm_].
-here the applicability of that system, called Storm (for storage module),
-in wireless communications (hence also e.g. in small low-powered devices) 
-is evaluated. the treatment is organized as follows: 
+The question this paper addresses is: 
+how to improve the usability and security
+of systems that deliver/manage data for ubiquitous and mobile computing?
+Specifically the issues of secure movement of data 
+over wireless connections and 
+to/from/between small devices in ad-hoc networks are in focus.
+
+the treatment is organized as follows: 
 in section 2., the requirements for secure (&usable) data mobility 
-over wireless communications are outlined.
-Then, the design and implemention of Storm is presented in section 3.
-Analysis of how the design meets the specific requirements set here
-is conducted in section 4. Finally related issues and reseach is discussed
+over wireless communications with small devices are reviewed.
+Then, design and implementation candidates are introduced in section 3.
+In section 4., analysis of how these systems meet 
+the specific requirements set here is conducted. 
+Finally related issues and reseach is discussed
 and open questions identified in conclusion.
 
-Requirements for data mobility over wireless communications
-===========================================================
+Requirements for secure and useful data ubiquity
+================================================
+
+((for data mobility) over wireless communications and in small devices)
 
-Technical
----------
+
+Wireless communications
+-----------------------
 
 - WLAN
+
 - Bluetooth
+ * SDP
+
 - 'Phone' (GSM/GPRS, UMTS)
 
 (draw from lecture material?)
 
+Small devices
+-------------
+
 Usability
 ---------
 
@@ -57,7 +81,8 @@
 That is but one of the many reasons why security must be considered on
 higher levels as well. Even application layer solutions are commonplace,
 e.g. using cryptographical means to protect data have been integrated in
-mail and chat clients (in tools such as pgp [], gpg [], silc [], ..).
+mail and chat clients (in tools such as pgp [], gpg [], silc [], ..) 
+and for terminal and web access (ssh [], ssl []).
 
 When considering mobile use, there may be different requirements for the
 application layer software than in conventional stationary use. For example,
@@ -66,7 +91,40 @@
 stationary use (more powerful machines) must be additionally evaluated with
 the small devices etc. in mind. Obviously, wireless connections can be used
 for stationary devices as well (e.g. satellite stations are very
-stationary), so there power distinction does not apply. 
+stationary), so there the computing power distinction does not apply. 
+
+..
+
+Candidate designs and implementations for enabling data ubiquity
+================================================================
+
+..
+
+JXTA? whatelse? (ask MediaTeam, Gaedke, ..?)
+
+An approach to improving data mobility is presented in [fallenstein03storm_].
+That system, called Storm (for storage module), is not targeted 
+towards low-powered devices but mainly desk- and laptop computers.
+It does have interesting features conserning wireless communications, 
+such as .. (diffs, multisource, location-independence) [foot: bias alert!
+(one of the) authors are involved in the design of this system]
+
+
+Comparative analysis of the candidates vs. requirements
+=======================================================
+
+..
+
+Discussion and conclusions
+==========================
+
+Data ubiquity was identified as a way to characterize the goals of 
+ubiquitous and mobile computing. The requirements set by 
+the wireless communications and limitations of small devices were reviewed,
+and candidate designs addressing these issues introduced.
+
+As results, ..
 
 ..
 
+Future: experimenting?
\ No newline at end of file




reply via email to

[Prev in Thread] Current Thread [Next in Thread]