Trust and Authorization in Pervasive B2E Scenarios

نویسندگان

  • Laurent Bussard
  • Yves Roudier
  • Roger Kilian-Kehr
  • Stefano Crosta
چکیده

Many pervasive and ubiquitous application scenarios consider the interaction of users with surrounding devices offering services anywhere and anytime as one of the main future challenges. However, before this vision becomes reality, many security issues have to be solved. More specifically, the problem of trustworthiness of unknown devices is one of the major obstacles hindering the acceptance of pervasive applications. This paper focuses on solutions for business-to-employee scenarios, a particular sub-domain of the ubiquitous computing paradigm in which valuable a priori trust information is available. Mechanisms and protocols are introduced to assess the trustworthiness of devices federated around a mobile user, and to allow for the delegation of authorizations between such devices. The first results of a prototype implementation are finally presented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Developing Pervasive Trust Paradigm for Authentication and Authorization

Trust plays a growing role in research on security in open computing systems, including Grid computing. We propose using trust for authorization in such systems. Traditionally, authentication and authorization in computer systems guard only user interfaces, thus providing only a perimeter defense against attacks. We search for an authentication and authorization approach that satisfies the requ...

متن کامل

A Context-Aware Entity Recognition Scheme for Pervasive Computing

In the future world filled with pervasive computing, almost all entities can be mobile, which means not only service requesters but also service providers are always dynamic and unpredictable. This raises two security problems. For service providers, how can they keep their security capability when they move here and there? And for service requesters, how can they be trusted by various service ...

متن کامل

Trust Enhanced Authorization for Distributed Systems

The trust –management approach to distributed system security is developed as an answer to the inadequacy of traditional authorization mechanism. The subjective concept of trust not only enables users to better understand the paradigm of pervasive computing, but also opens new direction of research for solving existing problems such as security [8], management of online communities or e-service...

متن کامل

How to deal with credentials in federations without global connectivity

In mobile and pervasive computing environments, not all devices have universal capabilities. To fulfill a certain task, it is often necessary to federate devices with specific resources. Because some devices are mobile, devices from different trust domains may have to interact with each other, and potentially sensitive data may flow from one domain into another. This interaction obviously requi...

متن کامل

Trustworthiness in Pervasive and Ubiquitous Environment

The technology needed to realize the goal of fully pervasive and mobile computing is rapidly coming together. Its emergence represents an unprecedented opportunity to expand the power of the Internet beyond traditional computing devices, enabling a world of smart spaces and smart appliances providing often invisible support for a variety of context-aware services with tremendous environmental a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003