Design of Architectures for Proximity-aware Services: Experiments in Context-based Authentication with Subjective Logic

作者: Gabriele Lenzini

DOI: 10.1016/J.ENTCS.2009.03.014

关键词:

摘要: This paper addresses the design of architectures for proximity-aware services with unobtrusive and context-based identification authentication features. A service is ''proximity-aware'' when it automatically detects presence entities in its proximity. process ''context-based'' uses contextual information to discern among different identities evaluate whether they are authentic or not. We refer an existing architecture, available our institute, where a network sensors used detect users user devices various locations building. Proximity-aware offered at intelligent coffee corners unobtrusively identified authenticated while approaching. level approaching identity calculated as overall expectation belief (i.e., trust) that (and not another) effectively standing space. use Subjective Logic theoretic framework calculations. According previous study ours, we manage each was recommender giving subjective ''opinions'' over statements concerning position users. Informally, has higher certain place more sensors-recommenders believe stands place. present comment results from array experiments show how trust can be authenticate room. perform under circumstances, namely change area room relative disposition sensors. indicate some guidelines aims maximise benefits framework.

参考文章(15)
Christine Cheng, Eric van den Berg, Ravi Jain, Location prediction algorithms for mobile wireless systems Wireless internet handbook. pp. 245- 263 ,(2003)
Audun Jøsang, Probabilistic logic under uncertainty symposium on the theory of computing. pp. 101- 110 ,(2007)
Chenlin Huang, Hua-Ping Hu, Zhiying Wang, Modeling Time-Related Trust grid and cooperative computing. pp. 382- 389 ,(2004) , 10.1007/978-3-540-30207-0_48
Audun Jøsang, Michael Kinateder, Elizabeth Gray, Simplification and analysis of transitive trust networks Web Intelligence and Agent Systems: An International Journal. ,vol. 4, pp. 139- 161 ,(2006)
R. J. Hulsebosch, M. S. Bargh, G. Lenzini, P. W. G. Ebben, S. M. Iacob, Context Sensitive Adaptive Authentication Lecture Notes in Computer Science. pp. 93- 109 ,(2007) , 10.1007/978-3-540-75696-5_6
Michael Burrows, Martin Abadi, Roger Needham, A logic of authentication ACM Transactions on Computer Systems. ,vol. 8, pp. 18- 36 ,(1990) , 10.1145/77648.77649
Gabriele Lenzini, Mortaza S. Bargh, Bob Hulsebosch, Trust-enhanced Security in Location-based Adaptive Authentication Electronic Notes in Theoretical Computer Science. ,vol. 197, pp. 105- 119 ,(2008) , 10.1016/J.ENTCS.2007.12.020
S. Nefti, F. Meziane, K. Kasiran, A fuzzy trust model for e-commerce congress on evolutionary computation. pp. 401- 404 ,(2005) , 10.1109/ICECT.2005.4
Audun Jøsang, Stephen Marsh, Simon Pope, Exploring Different Types of Trust Propagation Lecture Notes in Computer Science. pp. 179- 192 ,(2006) , 10.1007/11755593_14
AUDUN JØSANG, A logic for uncertain probabilities International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems. ,vol. 9, pp. 279- 311 ,(2001) , 10.1142/S0218488501000831