An authorization and access control scheme for pervasive computing

被引:0
|
作者
Staffans, LA [1 ]
Saridakis, T [1 ]
机构
[1] NOKIA Res Ctr, FIN-00045 Helsinki, Finland
来源
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING | 2004年
关键词
distributed security scheme; PKI; security policies;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environment with limited terminals. Better fitted are schemes, that do not rely on the presence of a central security authority, yet allows for the application of a common security policy. This paper presents such a distributed security scheme, where pieces of information of the same sensitivity are grouped together and protected by a pair of private encryption/decryption keys. Users gain access to certain information by obtaining the key pair of the corresponding group. Depending on the security policy applied in a given environment, the keys can be obtained either directly by the security authority which issues the keys or by another user that possesses them. Similarly, depending on the applied security policies, the access to information may require the user to authenticate himself. In the scheme we present, the authentication is based on certificates that users may obtain from the security authority at an unsuspected time prior to the information access.
引用
收藏
页码:726 / 733
页数:8
相关论文
共 50 条
  • [31] Towards the realisation of context-risk-aware access control in pervasive computing
    Ahmed, Ali
    Zhang, Ning
    TELECOMMUNICATION SYSTEMS, 2010, 45 (2-3) : 127 - 137
  • [32] Ethical Considerations of High Performance Computing Access for Pervasive Computing
    Kremer-Herman, Nathaniel
    DISTRIBUTED, AMBIENT AND PERVASIVE INTERACTIONS, DAPI 2023, PT I, 2023, 14036 : 311 - 327
  • [33] Ontology access patterns for pervasive computing environments
    Villanueva, F. J.
    Villa, D.
    Barba, J.
    Rincon, F.
    Moya, F.
    Lopez, J. C.
    AMBIENT INTELLIGENCE PERSPECTIVES, 2009, 1 : 236 - 244
  • [34] Security Access Model in Pervasive Computing Environment
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
  • [35] An efficient key management scheme for pervasive computing
    Ge, H
    ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 657 - 661
  • [36] Smart wireless access points for pervasive computing
    Ocampo, R
    de Meer, H
    WIRELESS ON-DEMAND NETWORK SYSTEMS, PROCEEDINGS, 2004, 2928 : 329 - 343
  • [37] FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing
    Zhang, Yu
    Chen, Jing
    Du, Ruiying
    Deng, Lan
    Xiang, Yang
    Zhou, Qing
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 310 - 319
  • [38] Proposed Scheme for Data Confidentiality and Access Control in Cloud Computing
    Ghimes, Ana-Maria
    Patriciu, Victor Valeriu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, (SECITC 2016), 2016, 10006 : 274 - 285
  • [39] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020
  • [40] A Multilevel Access Control Scheme for Data Security in Transparent Computing
    Peng, Tao
    Liu, Qin
    Wang, Guojun
    COMPUTING IN SCIENCE & ENGINEERING, 2017, 19 (01) : 46 - 53