Limited-lifetime shared-access in mobile systems
نویسندگان
چکیده
In this paper, we propose a simple access protocol to shared information in a mobile environment. The objective of the proposed scheme is to allow a specified set of users access to shared information and protect the confidentiality of the information from users outside this set. The set of users may be updated from time to time. In particular, the duration during which a user is allowed access to the shared information may be restricted. Furthermore, the information itself has limited lifetime and the confidentiality of the information has to be preserved during this lifetime only. The proposed access protocol is in particular suited to the mobile environment, because of the loose binding of the communicating entities.
منابع مشابه
Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks
In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...
متن کاملA Security Scheme for Dependable Key Insertion in Mobile Embedded Devices
Public Key Cryptography enables entity authentication protocols based on a platform’s knowledge of other platforms’ public key. This is particularly advantageous for embedded systems, such as FPGA platforms, with limited or none read-protected memory resources. For access control systems, an access token is authenticated by the mobile system. Only the public key of authorized tokens needs to be...
متن کاملUnderstanding the roles of different stakeholders influencing the use of mobile phones to access agricultural information: A Case of Kilolo and Kilosa Districts, Tanzania
The study investigated the roles of different stakeholders influencing the use of mobile phones in accessing agricultural information in Tanzania. While information is becoming an important ingredient in agriculture, farmers in Tanzania suffer the problem of lacking access to agricultural information. Promisingly, mobile phone technology has become the most valued infrastructure which gives peo...
متن کاملA Secure Keyflashing Framework for Access Systems in Highly Mobile Devices
Public Key Cryptography enables for entity authentication protocols based on a platform’s knowledge of other platforms’ public key. This is particularly advantageous for embedded systems, such as FPGA platforms with limited or none read-protected memory resources. For access control to mobile systems, the public key of authorized tokens need to be stored inside the mobile platform. At some poin...
متن کاملOptimistic Data Replication for Mobile Applications
The number of mobile devices in use is exploding, and mobile devices are becoming more and more interconnected. As a result, users are demanding mobile access to their favorite applications as well as to new collaborative and group applications made possible by ad hoc networks of mobile clients. Many of these applications need to access data that is shared between multiple mobile clients. Optim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Wireless Networks
دوره 1 شماره
صفحات -
تاریخ انتشار 1995