Mobile trust negotiation - Authentication and authorization in dynamic mobile networks

被引:0
|
作者
van der Horst, TW [1 ]
Sundelin, T [1 ]
Seamons, KE [1 ]
Knutson, CD [1 ]
机构
[1] Brigham Young Univ, Provo, UT 84602 USA
来源
关键词
trust negotiation; authentication; authorization; access control; mobile computing; proxy; software agent; credential repository;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We examine several architectures for extending the nascent, technology of automated trust negotiation to bring nonidentity-based authentication and authorization to mobile devices. We examine how the location of trust agents and secure repositories affects such a system. We also present an implementation of one of these models. This protocol leverages software proxies, autonomous trust agents, and secure repositories to allow portable devices from different security domains (i.e., with no pre-existing relationship) to establish trust and perform secure transactions. This proposed system is called surrogate trust negotiation as the sensitive and resource-intense tasks of authentication are performed vicariously for the mobile device by a surrogate trust agent.
引用
下载
收藏
页码:97 / 109
页数:13
相关论文
共 50 条
  • [1] Authentication and authorization of mobile clients in public data networks
    Reddy, P
    Krishnan, V
    Zhang, K
    Das, D
    INFRASTUCTURE SECURITY, PROCEEDINGS, 2002, 2437 : 115 - 128
  • [2] Trust negotiation for authentication and authorization in healthcare information systems
    Vawdrey, DK
    Sundelin, TL
    Seamons, KE
    Knutson, CD
    PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-4: A NEW BEGINNING FOR HUMAN HEALTH, 2003, 25 : 1406 - 1409
  • [3] Trust Enhanced Authorization for Mobile Agents
    Ruan, Chun
    Varadharajan, Vijay
    E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2009, 5692 : 84 - 95
  • [4] A soft dynamic service specific trust management and authentication scheme for mobile adhoc networks
    Bhattacharyya, Murari
    Nandi, Subrata
    Saha, Soumya
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 195 - +
  • [5] Pervasive authentication and authorization infrastructures for mobile users
    Forne, Jordi
    Hinarejos, Francisca
    Marin, Andres
    Almenarez, Florina
    Lopez, Javier
    Montenegro, Jose A.
    Lacoste, Marc
    Diaz, Daniel
    COMPUTERS & SECURITY, 2010, 29 (04) : 501 - 514
  • [6] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES
    Wang, Jian
    Jiang, Nan
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +
  • [7] Efficient Authentication and Authorization Infrastructure for Mobile Users
    Jin, Zhen Ai
    Lee, Sang-Eon
    Yoo, Kee Young
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, 2008, 4977 : 155 - +
  • [8] An Architecture for Dynamic Trust Monitoring in Mobile Networks
    Onolaja, Olufunmilola
    Bahsoon, Rami
    Theodoropoulos, Georgios
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2009 WORKSHOPS, 2009, 5872 : 494 - 503
  • [9] Providing fault-tolerant authentication and authorization in wireless mobile IP networks
    Lin, Jenn-Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 149 - 163
  • [10] A Dynamic Trust Framework for Opportunistic Mobile Social Networks
    Wang, Eric Ke
    Li, Yueping
    Ye, Yunming
    Yiu, S. M.
    Hui, Lucas C. K.
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2018, 15 (01): : 319 - 329