One-Time Authorization for off-line Interactions
نویسندگان
چکیده
Ubiquitous application environments are characterized by lack of on-line access to communication facilities and lack of a priori trust among parties. In this paper we present an access control scheme suited to these environments that allows a user to get authorized access to a service based on the one-time credential concept. In this scheme, the user and the service provider do not need to be part of the same organization or to trust one another. The verification of the user’s credential can be performed without any communication with a third party system, since the validity of each one-time credential can be locally checked by each service provider. The one-time property of credentials further prevents double use of an access right by the user subsequently attempting to access several service providers. The one-time property and the resulting double use prevention rely on a penalty mechanism whereby a cheating user looses some money he/she deposited as a guarantee of his/her loyalty prior to a serie of service accesses. The one-time property does not require a common trust structure encompassing clients and servers in that it only has recourse to a universal enforcement mechanism based on money.
منابع مشابه
Authorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملThe design and implementation of the integrated authorization system for generating distributed database in switching systems
In this paper we describe the design and implementation of the integrated authorization system for building distributed database for the real-time DBMS in the switching systems. This system has been developed on purpose of making the reliable distributed database for the switching systems. The architecture, the operational functions, and the various features of the integrated database authoriza...
متن کاملAutomatic off-Line Signature Verification Systems: A Review
The use of biometric technologies for human identity verification is growing rapidly in civilized society and showing its advancement towards the usability of biometrics for security. Off-line signature verification is considered as a behavioral characteristic based biometric trait in the field of security and the prevention of fraud. So, offline signatures are extensively used as a means of pe...
متن کاملHow to deal with credentials in federations without global connectivity
In mobile and pervasive computing environments, not all devices have universal capabilities. To fulfill a certain task, it is often necessary to federate devices with specific resources. Because some devices are mobile, devices from different trust domains may have to interact with each other, and potentially sensitive data may flow from one domain into another. This interaction obviously requi...
متن کاملSignature Recognition and Verification Using Cascading of Tchebichef Moment and Contour Curvature Features in Matlab
Signature verification is most commonly used as an authorization tool from the beginning till now. Many people uses bank cheques for most of their transactions. Although banks are computerized, but still verification process of signature in cheques is done manually which consumes time and even misleads sometimes. Signatures verification process can be done online or off-line depending upon the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003