A Policy-based Authorization Scheme for Resource Sharing in Pervasive Environments

作者: Roberto Morales , Jetzabel Serna , Manel Medina

DOI: 10.1007/978-3-8348-9788-6_26

关键词:

摘要: Ubiquitous environments require special properties that traditional computing does not support. The high diversity of mobile devices and the marked rise in ubiquitous resources have originated a great variety challenges such as proper resource management which plays fundamental role pervasive computing, where adaptation dynamic re-configuration take place. In previous works [MoGi08], [MoOG10] we presented CARM (Composable-Adaptive Resource Management), new adaptive approach supports for required resources. constitutes component-based model to abstract system’s transparent uniform way applications. Due its network heterogeneity population nomadic users, important security arise; therefore, this article address CARM’s primary concerns towards development “Security module” capable certifying eligibility join personal without compromising privacy. Our is analyzed terms Authentication Authorization, essentially consisting an authorization scheme using Attribute Certificates (ACs) supported by control policies define all decisions needed among unknown devices. This paper mainly describes ongoing work proof-of-concept implementation given scenarios; initially considering two enabled mobile-phones with Bluetooth connectivity enforcing altering bandwidth efficiency.

参考文章(16)
Roberto Morales, Marisa Gil, CARM: Composable, Adaptive Resource Management system in ubiquitous computing environments Springer Berlin / Heidelberg. pp. 335- 342 ,(2009) , 10.1007/978-3-540-85867-6_39
Wei Zhou, C. Meinel, Implement role based access control with attribute certificates international conference on advanced communication technology. ,vol. 1, pp. 536- 540 ,(2004) , 10.1109/ICACT.2004.1292928
Beatriz Otero Calviño, Marisa Gil, Roberto Antonio Morales Pacheco, Mobile resource management for better user experience: an audio case study ubiquitous computing. pp. 169- 178 ,(2010)
S. Farrell, R. Housley, An Internet Attribute Certificate Profile for Authorization RFC. ,vol. 3281, pp. 1- 40 ,(2002)
L. Kagal, T. Finin, A. Joshi, Trust-based security in pervasive computing environments IEEE Computer. ,vol. 34, pp. 154- 157 ,(2001) , 10.1109/2.970591
Roy Want, Trevor Pering, Shivani Sud, Barbara Rosario, Dynamic composable computing Proceedings of the 9th workshop on Mobile computing systems and applications - HotMobile '08. pp. 17- 21 ,(2008) , 10.1145/1411759.1411765
William Claycomb, Dongwan Shin, Towards secure resource sharing for impromptu collaboration in pervasive computing Proceedings of the 2007 ACM symposium on Applied computing - SAC '07. pp. 940- 946 ,(2007) , 10.1145/1244002.1244208
Azzedine Boukerche, Yonglin Ren, A trust-based security system for ubiquitous and pervasive computing environments Computer Communications. ,vol. 31, pp. 4343- 4351 ,(2008) , 10.1016/J.COMCOM.2008.05.007
Patroklos G. Argyroudis, Donal O’Mahony, ÆTHER: an Authorization Management Architecture for Ubiquitous Computing Public Key Infrastructure. pp. 246- 259 ,(2004) , 10.1007/978-3-540-25980-0_20
David Chadwick, Gansen Zhao, Sassa Otenko, Romain Laborde, Linying Su, Tuan Anh Nguyen, None, PERMIS: a modular authorization infrastructure Concurrency and Computation: Practice and Experience. ,vol. 20, pp. 1341- 1357 ,(2008) , 10.1002/CPE.V20:11