An authorization and access control scheme for pervasive computing

被引:0
|
作者
Staffans, LA [1 ]
Saridakis, T [1 ]
机构
[1] NOKIA Res Ctr, FIN-00045 Helsinki, Finland
来源
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING | 2004年
关键词
distributed security scheme; PKI; security policies;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environment with limited terminals. Better fitted are schemes, that do not rely on the presence of a central security authority, yet allows for the application of a common security policy. This paper presents such a distributed security scheme, where pieces of information of the same sensitivity are grouped together and protected by a pair of private encryption/decryption keys. Users gain access to certain information by obtaining the key pair of the corresponding group. Depending on the security policy applied in a given environment, the keys can be obtained either directly by the security authority which issues the keys or by another user that possesses them. Similarly, depending on the applied security policies, the access to information may require the user to authenticate himself. In the scheme we present, the authentication is based on certificates that users may obtain from the security authority at an unsuspected time prior to the information access.
引用
收藏
页码:726 / 733
页数:8
相关论文
共 50 条
  • [1] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [2] Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments
    Choi, Jung Hwan
    Kang, Dong Hyun
    Jang, Hyunsu
    Eom, Young Ik
    2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 491 - 498
  • [3] Negative Authorization in Access Control for Cloud Computing
    Li Xiaohui
    He Jingsha
    Zhang Ting
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 307 - 312
  • [4] A lightweight conditional privacy-preserving authentication and access control scheme for pervasive computing environments
    Tan, Zuowen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (06) : 1839 - 1846
  • [5] Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
    Li, Chun-Ta
    Hwang, Min-Shiang
    Chu, Yen-Ping
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4255 - 4258
  • [6] A nonmonotonic modal authorization logic for pervasive computing
    Noorollahi, Ali
    Fallah, Mehran S.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1077 - 1091
  • [7] Uncertainty assessment in access control of pervasive computing environments
    Pashazadeh, Saeid
    Dizaji, Mohammad Zendedel
    Amiri, Ali
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1174 - 1179
  • [8] An XML Based Access Control Architecture for Pervasive Computing
    Molla, Mohammad M.
    Madiraju, Praveen
    Malladi, Srilaxmi
    Ahamed, Sheikh Iqbal
    2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 803 - +
  • [9] Privacy Enhanced Access Control in Pervasive Computing Environments
    Ren, Kui
    Lou, Wenjing
    2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), 2005, : 384 - +
  • [10] Exploiting information relationships for access control in pervasive computing
    Hengartner, Urs
    Steenkiste, Peter
    PERVASIVE AND MOBILE COMPUTING, 2006, 2 (03) : 344 - 367