Counting Abuses Using Flexible Off-line Credentials
نویسندگان
چکیده
Mobile and ad-hoc networks allow businesses to provide a new range of applications and services and at the same time they introduce new constraints that have important effects on the way in which security primitives must be designed. This is challenging because it translates to a demand of richer and more flexible security primitives that often need to satisfy stricter requirements than traditional wired networks scenarios. In this paper we focus on one of this primitive, namely security credentials. We present a solution that extends the existing protocols used to implement off-line credentials such that, not only abuses can be detected but they can also be counted. Our solution addresses the problem of 1-time and 2-times credentials and we will conclude by discussing the challenges that need to be solved to generalize the primitive
منابع مشابه
Can we take this off - line ? Credentials for Web Services supported nomadic applications †
Devices supporting nomadic applications are assumed to be able to take advantage of the capabilities of surrounding devices. This paper discusses the access control requirements of such ad-hoc federations of communicating devices, some of which may be administered by a different authority, and illustrates how such scenarios would be handled in the Web Services Security and the framework propose...
متن کاملStability Assessment of the Flexible System using Redundancy
In this study, dynamic behavior of a mooring line in a floating system is analyzed by probability approaches. In dynamics, most researches have shown the system model and environments by mathematical expression. We called this process as the forward dynamics. However, there is a limit to define the exact environments because of uncertainty. To consider uncertainty, we introduce the redundancy i...
متن کاملAn Investigation into Possible Sources and Health Risks of Phthalic Acid Esters in the Iranian Laminated Flexible Films
Phthalates are esters of phthalic acid, mainly used as plasticizer in polymeric packaging materials. The main objective of this research was to determine the exact roots of the phthalate esters in the Iranian flexible/laminated packaging films commercially used for food products such as ketchup, spaghetti, mayonnaise, black tea and snack foods. This investigation was carried out by analyzing th...
متن کاملNew Deterministic Algorithms for Counting Pairs of Intersecting Segments and Off-Line Triangle Range Searching
We describe a new method for decomposing planar sets of segments and points. Using this method we obtain new efficient deterministic algorithms for counting pairs of intersecting segments, and for answering off-line triangle rang'e queries. In particular we obtain the following results: (1) Given n segments in the plane, the number K of pairs of intersecting segments is computed in time O(nl+ f...
متن کاملSimultaneous Lot Sizing and Scheduling in a Flexible Flow Line
This paper breaks new ground by modelling lot sizing and scheduling in a flexible flow line (FFL) simultaneously instead of separately. This problem, called the ‘General Lot sizing and Scheduling Problem in a Flexible Flow Line’ (GLSP-FFL), optimizes the lot sizing and scheduling of multiple products at multiple stages, each stage having multiple machines in parallel. The objective is to satisf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005