Title | ||
---|---|---|
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems |
Abstract | ||
---|---|---|
It is the ubiquity and mobility absolutely necessary for ubiquitous computing environments that raise new challenges for pervasive service provision invisibly. Particularly, mobility of users/devices causes unpredefined and unpredictable changes in physical location and in available resources and services, event at runtime and during the same service session, thus forcing us to consider very dynamic aspects of evaluation when designing an access control mechanism. Alternatively, there is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it essential to establish trust from scratch. This task becomes extremely challenging when it is simultaneously necessary to protect the privacy of the users involved. In this paper*, we first show how trust evaluation process of the user's system can be based on previous accesses and peer recommendations. A solution then relied on trust to control access is proposed that depends upon pre-defined access control security policy. Several tuning parameters and options are suggested so that end-users can customize to meet the security and privacy requirement of a ubiquitous system. |
Year | DOI | Venue |
---|---|---|
2007 | 10.1109/MUE.2007.13 | MUE |
Keywords | Field | DocType |
previous access,ubiquitous systems,trust relationship,ubiquitous computing environment,flexible trust-based access control,access control mechanism,privacy requirement,pre-defined access control security,trust evaluation process,pervasive computing environment,service session,privacy enhancement,pervasive service provision invisibly,security policy,authorisation,computer security,privacy,data security,access control,information technology,data privacy,ubiquitous computing,pervasive computing | Service provision,Internet privacy,Data security,Ubiquitous systems,Trust relationship,Computer security,Computer science,Access control,Security policy,Ubiquitous computing,Information privacy | Conference |
ISBN | Citations | PageRank |
0-7695-2777-9 | 5 | 0.50 |
References | Authors | |
8 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Pho Duc Giang | 1 | 11 | 2.18 |
Le Xuan Hung | 2 | 194 | 15.73 |
Sungyoung Lee | 3 | 2932 | 279.41 |
Young-Koo Lee | 4 | 2073 | 188.97 |
Heejo Lee | 5 | 1501 | 132.47 |