An authorization and access control scheme for pervasive computing

被引:0
|
作者
Staffans, LA [1 ]
Saridakis, T [1 ]
机构
[1] NOKIA Res Ctr, FIN-00045 Helsinki, Finland
来源
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING | 2004年
关键词
distributed security scheme; PKI; security policies;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environment with limited terminals. Better fitted are schemes, that do not rely on the presence of a central security authority, yet allows for the application of a common security policy. This paper presents such a distributed security scheme, where pieces of information of the same sensitivity are grouped together and protected by a pair of private encryption/decryption keys. Users gain access to certain information by obtaining the key pair of the corresponding group. Depending on the security policy applied in a given environment, the keys can be obtained either directly by the security authority which issues the keys or by another user that possesses them. Similarly, depending on the applied security policies, the access to information may require the user to authenticate himself. In the scheme we present, the authentication is based on certificates that users may obtain from the security authority at an unsuspected time prior to the information access.
引用
收藏
页码:726 / 733
页数:8
相关论文
共 50 条
  • [41] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Tzer-Shyong Chen
    Chia-Hui Liu
    Tzer-Long Chen
    Chin-Sheng Chen
    Jian-Guo Bau
    Tzu-Ching Lin
    Journal of Medical Systems, 2012, 36 : 4005 - 4020
  • [42] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [43] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [44] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [45] SCN-SI-021 Achieving privacy and access control in pervasive computing environments
    Magkos, Emmanouil
    Kotzanikolaou, Panayiotis
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 94 - 105
  • [46] Trust based Authorization and Access Control
    Feng Fujun
    Li Junshan
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 162 - 165
  • [47] A spatio-temporal access control model supporting delegation for pervasive computing applications
    Ray, Indrakshi
    Toahchoodee, Manachai
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2008, 5185 : 48 - 58
  • [48] Exploiting hierarchical identity-based encryption for access control to pervasive computing information
    Hengartner, U
    Steenkiste, P
    FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 384 - 393
  • [49] Extensible Access Control with Authorization Contracts
    Moore, Scott
    Dimoulas, Christos
    Findler, Robert Bruce
    Flatt, Matthew
    Chong, Stephen
    ACM SIGPLAN NOTICES, 2016, 51 (10) : 214 - 233
  • [50] An authorization model for collaborative access control
    Ma, Chen-hua
    Lu, Guo-dong
    Qiu, Jiong
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (09): : 699 - 717