Overview: 01. M Weiser, Some Computer Science Issues in Ubiquitous Computing, Communications of the ACM, ACM Press New York, NY, USA, 1993 02. RK Thomas, R Sandhu, Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions, Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW¡¯04) 03. M. Satyanarayanan, Pervasive Computing: Vision and Challenges, IEEE Personal Communications, 2001 04. Kumar Ranganathan, Trustworthy Pervasive Computing: The Hard Security Problems, PERCOMW¡¯04 05. F Stajano, RJ Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks, Security Protocols Workshop, 1999 06. F Stajano, RJ Anderson, The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Security Protocols Workshop, 1999 Authentication: 01. S Creese, M Goldsmith, B Roscoe, I Zakiuddin, Authentication for Pervasive Computing, International Conference on Security in Pervasive Computing, 2003 02. K Matsumiya, S Aoki, M Murase, H Tokuda, Active Authentication for Pervasive Computing Environments, International Symposium on Software Security, 2002 03. J Al-Muhtadi, A Ranganathan, R Campbell, Dennis Mickunas, A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments, Distributed Computing Systems Workshops, 2002 Access Control: 01. Lalana Kagal, Tim Finin, and Anupam Joshi, Trust-Based Security in Pervasive Computing Environments, IEEE Pervasive Computing Dec 2001 02. Urs Hengartner and Peter Steenkiste, Access Control to Information in Pervasive Computing Environments, Proc. of 9th Workshop on Hot Topics in Operating Systems (HotOS IX), Lihue, HI, May 2003 03. Urs Hengartner and Peter Steenkiste, Exploiting Information Relationships For Access Control, Proc. of Third IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), Kauai Island, HI, March 2005 04. Jalal Al-Muhtadi, Anand Ranganathan, Roy Campbell, M. Dennis Mickunas, Cerberus: A Context-Aware Security Scheme for Smart Spaces, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom¡¯03) 05. Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd, Securing Context-Aware Applications Using Environment roles, SACMAT¡¯01 Privacy: 01. AR Beresford, F Stajano, Location Privacy in Pervasive Computing, IEEE Pervasive Computing 2003 02. X Jiang, JA Landay, Modeling Privacy Control in Context-Aware Systems, IEEE Pervasive Computing 2002 03. Mark Ackerman, Trevor Darrell, Daniel J. Weitzner, Privacy in Context, HUMAN-COMPUTER INTERACTION, 2001, Volume 16, pp. 167-176