A Domain-Oriented Approach for Access Control in Pervasive Environments

被引:0
|
作者
Li, Jun [1 ]
Christianson, Bruce [2 ]
机构
[1] Secur & Privacy Enterprise Risk Serv, London EC4A 4TR, England
[2] Univ Hertfordshire, Sch Comp Sci, Hatfield, Herts, England
关键词
Domain-oriented access control; pervasive computing; identity-based encryption; revocation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Pervasive computing envisions an environment in which we are surrounded by many embedded computer devices. Those networked devices provide us with a mobile, spontaneous and dynamic way to access various resources provided by domains with different security policies. The conventional approach to secure access over multiple domains is to implement a universal trusted infrastructure,. extending local identity- or capability-based security systems and combining them with cross-domain authentication mechanisms. However, this does not adequately meet the security requirements of communicating with strangers in pervasive environments. This paper presents an intrinsically multi-domain oriented approach which incorporates an identity-based encryption (IBE) access control mechanism. This approach allows the right domain to get involved with its local players' interactions by helping them to convert a token to a usable access capability, whilst facilitating revocation.
引用
收藏
页码:278 / +
页数:3
相关论文
共 50 条
  • [1] Domain-oriented design environments
    Fischer, G
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1996, : 517 - 520
  • [2] DOMAIN-ORIENTED DESIGN ENVIRONMENTS
    FISCHER, G
    [J]. INFORMATION PROCESSING '94, VOL II: APPLICATIONS AND IMPACTS, 1994, 52 : 115 - 122
  • [3] Opportunistic pervasive computing with domain-oriented virtual machines
    Domaszewicz, J.
    Roj, M.
    Pruszkowski, A.
    [J]. DSD 2006: 9TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN: ARCHITECTURES, METHODS AND TOOLS, PROCEEDINGS, 2006, : 598 - +
  • [4] Study on Security Domain-Oriented Military Information Systems Access Control Model
    Jin, Yan
    Liu, Hao
    Sun, Lin
    Song, Jing
    [J]. PRACTICAL APPLICATIONS OF INTELLIGENT SYSTEMS, ISKE 2013, 2014, 279 : 849 - +
  • [5] A systematic approach to domain-oriented software development
    Shimizu, Y
    Fujimaki, N
    Hirayama, M
    [J]. PROCEEDINGS OF THE 1998 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 1998, : 499 - 502
  • [6] SUPPORTING SOFTWARE DESIGNERS WITH INTEGRATED DOMAIN-ORIENTED DESIGN ENVIRONMENTS
    FISCHER, G
    GIRGENSOHN, A
    NAKAKOJI, K
    REDMILES, D
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1992, 18 (06) : 511 - 522
  • [7] DOOR - An approach for reusing and retrieving domain-oriented components
    Al-Yasiri, A
    Bamford, C
    [J]. 10TH EUROMICRO WORKSHOP ON REAL-TIME SYSTEMS, PROCEEDINGS, 1998, : 230 - 237
  • [8] A Quality of Context-Aware Approach to Access Control in Pervasive Environments
    Toninelli, Alessandra
    Corradi, Antonio
    Montanari, Rebecca
    [J]. MOBILE WIRELESS MIDDLEWARE, OPERATING SYSTEMS, AND APPLICATIONS, 2009, 7 : 236 - 251
  • [9] A domain-oriented, model-based approach for construction and verification of railway control systems
    Haxthausen, Anne E.
    Peleska, Jan
    [J]. FORMAL METHODS AND HYBRID REAL-TIME SYSTEMS, 2007, 4700 : 320 - +
  • [10] Domain-Oriented Verification Management
    Leilde, Vincent
    Ribaud, Vincent
    Teodorov, Ciprian
    Dhaussy, Philippe
    [J]. MODEL AND DATA ENGINEERING, MEDI 2018, 2018, 11163 : 354 - 370