An authorization and access control scheme for pervasive computing

被引:0
作者
Staffans, LA [1 ]
Saridakis, T [1 ]
机构
[1] NOKIA Res Ctr, FIN-00045 Helsinki, Finland
来源
PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING | 2004年
关键词
distributed security scheme; PKI; security policies;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environment with limited terminals. Better fitted are schemes, that do not rely on the presence of a central security authority, yet allows for the application of a common security policy. This paper presents such a distributed security scheme, where pieces of information of the same sensitivity are grouped together and protected by a pair of private encryption/decryption keys. Users gain access to certain information by obtaining the key pair of the corresponding group. Depending on the security policy applied in a given environment, the keys can be obtained either directly by the security authority which issues the keys or by another user that possesses them. Similarly, depending on the applied security policies, the access to information may require the user to authenticate himself. In the scheme we present, the authentication is based on certificates that users may obtain from the security authority at an unsuspected time prior to the information access.
引用
收藏
页码:726 / 733
页数:8
相关论文
共 17 条
[1]  
ARSENALUT A, 2002, PKIX WORK GROUP JUL
[2]  
Bacon J., 2002, ACM Transactions on Information and Systems Security, V5, P492, DOI 10.1145/581271.581276
[3]  
*BERK U CAL, END EXP CHART FLUID
[4]  
*CARN MELL U, PROJ AUR DISTR FREE
[5]   Certificate based authorization simulation system [J].
Dai, J ;
Alves-Foss, J .
25TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 2001, :190-195
[6]  
ELLISON C, 1999, 2693 RFC
[7]   Towards an access control system for mobile Peer-to-Peer collaborative environments [J].
Fenkam, P ;
Dustdar, S ;
Kirda, E ;
Reif, G ;
Gall, H .
WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, :95-100
[8]  
Gollmann D., 1999, COMPUTER SECURITY
[9]  
GUPTA V, 1999, ACM MOBILE NETWORKS, V3, P381
[10]   Trust-based security in pervasive computing environments [J].
Kagal, L ;
Finin, T ;
Joshi, A .
COMPUTER, 2001, 34 (12) :154-157