Enhancing access control for mobile devices with an agnostic trust negotiation decision engine

被引:0
|
作者
Diaz-Sanchez, Daniel [1 ]
Marin, Andres [1 ]
Almenarez, Florina [1 ]
机构
[1] Univ Carlos III Madrid, Telemat Engn Dept, Avda Univ 30, Leganes 28911, Madrid, Spain
来源
关键词
trust negotiation; access control; flexible;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Dynamic open environments demand trust negotiation Systems for unknown entities willing to communicate. A security context has to be negotiated gradually in a fair peer to peer basis depending on the security level demanded by the application. Trust negotiation engines are driven by decision engines that lack of flexibility: depend on the implementation, policies languages or credentials types to be used. In this paper we present an agnostic engine able to combine all that information despite its origin or language allowing to select policies or requirements, credentials and resources to disclose, according to user preferences and context using iterative weighted Multidimensional Scaling to assist a mobile device during a trust negotiation.
引用
收藏
页码:304 / +
页数:2
相关论文
共 50 条
  • [41] IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices
    Teh, Thong-Yun
    Lee, Yik-Shu
    Cheah, Zi-Yik
    Chin, Ji-Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (01) : 127 - 144
  • [42] IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices
    Thong-Yun Teh
    Yik-Shu Lee
    Zi-Yik Cheah
    Ji-Jian Chin
    Wireless Personal Communications, 2017, 94 : 127 - 144
  • [43] DFCloud : A TPM-based Secure Data Access Control Method of Cloud Storage in Mobile Devices
    Shin, Jaebok
    Kim, Yungu
    Park, Wooram
    Park, Chanik
    2012 IEEE 4TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2012,
  • [44] Real-Time Lightweight Cloud-Based Access Control for Wearable IoT Devices: A Zero Trust Protocol
    Ejiyeh, Atefeh Mohseni
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY OF SENSING SYSTEMS, SENSORS S&P 2023, 2023, : 22 - 29
  • [45] Research on identity-based cluster access control model with dynamic trust agent for mobile ad hoc networks
    Lu, Feng
    Zhou, Tian
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 956 - 960
  • [46] ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments
    Huang, Wenhua
    Xie, Xuemin
    Wang, Ziying
    Feng, JingYu
    Han, Gang
    Zhang, Wenbo
    AD HOC NETWORKS, 2023, 145
  • [47] A Semi-Markovian Decision Process Based Control Method for Offloading Tasks from Mobile Devices to the Cloud
    Chen, Shuang
    Wang, Yanzhi
    Pedram, Massoud
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 2885 - 2890
  • [48] Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust Framework
    Li, Yong
    Chen, Lu
    Li, Nige
    Lu, Ziang
    Dai, Zaojian
    Wu, Fan
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 612 - 624
  • [49] LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices
    Gao, Qi
    Zhang, Junwei
    Ma, Jianfeng
    Yang, Chao
    Guo, Jingjing
    Miao, Yinbin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [50] Mobile and Portable De-Icing Devices for Enhancing the Distribution System Resilience Against Ice Storms Preventive strategies for damage control
    Bahrami, Anahita
    Yan, Mingyu
    Shahidehpour, Mohammad
    Pandey, Shikhar
    Vukojevic, Aleksander
    Paaso, Esa Aleksi
    IEEE ELECTRIFICATION MAGAZINE, 2021, 9 (03): : 120 - 129