Distributed Trust Based Access Control Architecture for Pervasive Computing

被引:0
作者
Javeed, M. Younas [1 ]
Nawaz, Sidra [1 ]
机构
[1] EME Coll, NUST, Dept Comp Engn, Rawalpindi, Pakistan
来源
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009) | 2009年
关键词
Trust; Pervasive computing; Access Control; Security; Distributed systems;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the demands of the handheld devices and pervasive services are increasing, the issues of security have alarmingly risen. One can wonder about the pervasive services to be free of every security flaw. The paper suggests a mechanism for a trust based ad-hoc authentication with a distributed trust based mechanism and defined security policies related to access control for pervasive devices. The openness of a true pervasive environment has been encountered with the interaction history and recommendations. The architecture is designed to provide secure autonomous services for an assumed pervasive based scenario. The nature of pervasiveness is satisfied by allowing the novel user to proceed in the system but with the minimum trust initially, which changes dynamically depending on the actions which the user performs. It secures the privacy of the user by the implementation of security policies in the Security Manger(SM) in order to gain final access to the service.
引用
收藏
页码:464 / 469
页数:6
相关论文
共 10 条
[1]  
Almenárez F, 2005, LECT NOTES COMPUT SC, V3450, P225
[2]  
Blaze M., 1999, The keyNote trust-management system, Version 2
[3]  
Blaze M, 1996, IEEE S SEC PRIV OAKL
[4]  
ESWARI PRL, 2008, COMPREHENSIVE SECURI
[5]  
Haque M., 2006, INT J NETWORK SECURI, V3, P203
[6]  
KAGAL S, 2001, P IJCAI 01 WORKSH AU
[7]  
SHARMIN M, 2006, 4 ANN IEEE INT C PER, P258
[8]  
STEFFEN R, 2005, INT C PERV COMP MUN
[9]  
Sun T, 2007, CAN CON EL COMP EN, P1219
[10]  
2001, IEEE COMPUTER, P154