Trusted or Untrusted—
Defining the Permissions of Guests.

Matthew Johnson

University of Cambridge Computer Laboratory

Smart Environments

Guests

How Smart Environments Work

Identifying Guests

Defining Access Permissions

Demo

Demo Concepts—Security Policies

Demo Concepts—Types of Function

Demo Concepts—Implementation

Other Appliances and Delegation

Conclusion