Limited-lifetime shared-access in mobile systems

نویسندگان

  • Zygmunt J. Haas
  • Sanjoy Paul
چکیده

In this paper, we propose a simple access protocol to shared information in a mobile environment. The objective of the proposed scheme is to allow a specified set of users access to shared information and protect the confidentiality of the information from users outside this set. The set of users may be updated from time to time. In particular, the duration during which a user is allowed access to the shared information may be restricted. Furthermore, the information itself has limited lifetime and the confidentiality of the information has to be preserved during this lifetime only. The proposed access protocol is in particular suited to the mobile environment, because of the loose binding of the communicating entities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Public Key Cryptography enables entity authentication protocols based on a platform’s knowledge of other platforms’ public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be...

متن کامل

Understanding the roles of different stakeholders influencing the use of mobile phones to access agricultural information: A Case of Kilolo and Kilosa Districts, Tanzania

The study investigated the roles of different stakeholders influencing the use of mobile phones in accessing agricultural information in Tanzania. While information is becoming an important ingredient in agriculture, farmers in Tanzania suffer the problem of lacking access to agricultural information. Promisingly, mobile phone technology has become the most valued infrastructure which gives peo...

متن کامل

A Secure Keyflashing Framework for Access Systems in Highly Mobile Devices

Public Key Cryptography enables for entity authentication protocols based on a platform’s knowledge of other platforms’ public key. This is particularly advantageous for embedded systems, such as FPGA platforms with limited or none read-protected memory resources. For access control to mobile systems, the public key of authorized tokens need to be stored inside the mobile platform. At some poin...

متن کامل

Optimistic Data Replication for Mobile Applications

The number of mobile devices in use is exploding, and mobile devices are becoming more and more interconnected. As a result, users are demanding mobile access to their favorite applications as well as to new collaborative and group applications made possible by ad hoc networks of mobile clients. Many of these applications need to access data that is shared between multiple mobile clients. Optim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Wireless Networks

دوره 1  شماره 

صفحات  -

تاریخ انتشار 1995