Securing Information Gateways with Derivation-Constrained Access Control

نویسندگان

  • Urs Hengartner
  • Peter Steenkiste
چکیده

In pervasive computing environments, information gateways derive specific information, such as a person’s location, from raw data provided by a service, such as a videostream offered by a camera. Here, access control to confidential raw data provided by a service becomes difficult when a client does not have access rights to this data. For example, a client might have access to a person’s location information, but not to the videostream from which a gateway derives this information. Simply granting access rights to a gateway will allow an intruder into the gateway to access any raw data that the gateway can access. We present the concept of derivation-constrained access control, which requires a gateway to prove to a service that the gateway needs requested raw data to answer a client’s authorized request for derived information. Therefore, an intruder into the gateway will be limited in its capabilities. We provide a formal framework for derivation-constrained access control based on Lampson et al.’s “speaks-for” relationship. We demonstrate feasibility of our design with a sample implementation and a performance evaluation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

Top 4 Network Security Challenges in Healthcare

• .................................................................... Top 4 Network Security Challenges › Addressing Security Challenges with Network Access Control › An Evolving Network Environment. • .................................... Securing and Provisioning Medical Devices › Securing Network Access for Guests and Visitors › Securing Access to Patient Information › Achieving Complia...

متن کامل

Protected Framework for Securing Sensitive Information from Unauthorized Users

The Access control mechanism avoids the unauthorized access of sensitive information. It protects the user information from the unauthorized access. The Protected protection mechanism is a much important concern in the case of sharing the sensitive information. The Protected protection mechanism provides better Protected for the sensitive information which is to be shared. The generally used Pr...

متن کامل

A Lightweight Resource-Oriented Application Framework for Wireless Sensor Networks Master’s Thesis

With current advancements in technology, an increasing number of embedded devices are being deployed around the world to solve dedicated, specific tasks like environmental monitoring or automating control. These resource-constrained devices operate in specialized, low-level physical links. We investigate the use of smart gateways to provide access on the Internet for these devices. These gatewa...

متن کامل

دروازه اطلاعات علمی،‌پژوهشی، و فناورانه ایران: خدمتی نوین برای پژوهشگران ایرانی

Information Subject Gateways are providing access to the necessary quality controlled databases among the vast resources for users of the web and saving them from the confusion and perplexity among the sources on the web. The main objective of this research is creating Iranian Gateway for Scientific, Research, and Technological Information as a valuable source for use by academics and researche...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006