ÆTHER: an Authorization Management Architecture for Ubiquitous Computing

نویسندگان

  • Patroklos G. Argyroudis
  • Donal O'Mahony
چکیده

The ubiquitous computing paradigm suggests that we are going to be surrounded by countless wireless devices capable of providing services transparently. By definition, the nature of ubiquitous computing environments is open and extremely dynamic, making difficult the establishment of predefined security relationships between all of the participating entities. Authentication mechanisms can be employed to establish the identity of a pervasive computing entity but they suffer from scalability problems and have limited value in defining authorization decisions among strangers. In this paper we propose ÆTHER, an authorization management architecture designed specifically to address trust establishment and access control in ubiquitous computing environments. Owners define attribute authority sets and access control policy entries that are embedded into their devices. Members of the attribute authority sets are trusted to issue credentials for the corresponding attributes that can then be used in order to gain access to protected resources. Our architecture supports dynamic membership in these sets facilitating distributed administration, which is required in the context of the volatile nature of ubiquitous security relationships, and attribute mapping to allow roaming among authority domains. Moreover, we present the foundation of a logic model for our proposed architecture that is used to prove access control decisions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a Context-aware Framework for Pervasive Computing Authorization Management

—Pervasive computing environments have by definition three main inherent properties; extremely open and dynamic nature, suggesting large number of interactions among previously unknown entities, the ability to adapt according to perceived context information, and interaction interfaces that integrate naturally with the goals users are trying to achieve. Traditional security management approache...

متن کامل

Securing Communications in the Smart Home

As the vision of ubiquitous computing becomes reality smart devices are embedded into our surroundings and domestic appliances providing services transparently. The nature of such smart computing environments is open and dynamic; therefore the use of predefined security associations between all of the participating devices is particularly difficult. Our proposal, called ÆTHER, defines a securit...

متن کامل

Pervasive authentication and authorization infrastructures for mobile users

Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastr...

متن کامل

Trust Enhanced Authorization for Distributed Systems

The trust –management approach to distributed system security is developed as an answer to the inadequacy of traditional authorization mechanism. The subjective concept of trust not only enables users to better understand the paradigm of pervasive computing, but also opens new direction of research for solving existing problems such as security [8], management of online communities or e-service...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004