Threshold-Based Location-Aware Access Control

نویسندگان

  • Roel Peeters
  • Dave Singelée
  • Bart Preneel
چکیده

Designing a secure, resilient and user-friendly access control system is a challenging task. In this article, a threshold-based location-aware access control mechanism is proposed. This design uniquely combines the concepts of secret sharing and distance bounding protocols to tackle various security vulnerabilities. The proposed solution makes use of the fact that the user carries around various personal devices. This solution offers protection against any set of (t-1) or fewer compromised user’s devices, with t being an adjustable threshold number. It removes the single point of failure in the system, as access is granted when one carries any set of t user’s devices. Additionally it supports user-centered management, since users can alter the set of personal devices and can adjust the security parameters of the access control scheme towards their required level of security and reliability. DOI: 10.4018/978-1-4666-2785-7.ch002

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Threshold-Based Distance Bounding

Conventional access control mechanisms usually rely on the use of a single token for user authentication, and are generally vulnerable to relay attacks. In addition, these systems often suffer from usability issues. Since they are centrally managed, key management tends to be a rather slow and cumbersome process in this setting. In this paper, we propose a threshold-based location-aware access ...

متن کامل

Mobile Security with Location-Aware Role-Based Access Control

This paper describes how location-aware Role-Based Access Control (RBAC) can be implemented on top of the Geographically eXtensible Access Control Markup Language (GeoXACML). It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile. The solution uses physical addressing of geographical locatio...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A Bandwidth and Latency-Aware Protocol for Streaming Multimedia Content

We design a bandwidth and latency aware application layer multicast protocol to stream multimedia content. This protocol considers network bandwidth heterogeneity, in which the cluster population is bounded by the capacity of the access point. The cluster range is limited by the end-to-end latency threshold. This protocol achieves high scalability by distributed and local administration. The ap...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJHCR

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011