A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2004; you can also visit the original URL.
The file type is
Proceedings of the 2002 ACM symposium on Applied computing - SAC '02
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and users have associated trusted software proxies that either run on the appliance hardware or on a trusted computer. We describe how security and privacy are enforced using two separate protocols: a protocol for secure deviceto-proxy communication, and a protocol for secure proxyto-proxy communication. Using two separatedoi:10.1145/508832.508845 fatcat:jyxubwcfcbdqbfxdyknrzplldi