A Security Architecture Based on Trust Management for Pervasive Computing Systems

dc.contributor.authorKagal, Lalana
dc.contributor.authorUndercoffer, Jeffrey
dc.contributor.authorPerich, Filip
dc.contributor.authorJoshi, Anupam
dc.contributor.authorFinin, Tim
dc.date.accessioned2018-12-20T16:12:02Z
dc.date.available2018-12-20T16:12:02Z
dc.date.issued2002-10-09
dc.descriptionGrace Hopper Celebration of Women in Computingen_US
dc.description.abstractTraditionally, stand-alone computers and small networks rely on user authentication and access control to provide security. These physical methods use system-based controls to verify the identity of a person or process, explicitly enabling or restricting the ability to use, change, or view a computer resource. However, these strategies are inadequate for the increased flexibility that distributed networks such as the Internet and ubiquitous/pervasive computing environments require, as these systems lack central control and in addition, their users are not all predetermined. Users in pervasive environments expect to access locally hosted resources and services anytime and anywhere leading to serious security risks and access control problems. We propose a solution based on distributed trust management which involves developing a security policy, assigning credentials to entities, verifying that the credentials conform to the policy, delegating trust to third parties, revoking rights and reasoning about users' access rights. This paper presents an infrastructure that complements existing security features like Public Key Infrastructure (PKI) and Role Based Access Control with distributed trust management to provide a highly flexible mode of enforcing security in a pervasive computing environments.en_US
dc.description.sponsorshipThis work was supported by NSF Awards IIS 9875433 and CCR 0070802, and the Defense Advanced Research Projects Agency under contract F30602-00-2-0 591 AO K528.en_US
dc.description.urihttps://ebiquity.umbc.edu/paper/html/id/42/A-Security-Architecture-Based-on-Trust-Management-for-Pervasive-Computing-Systemsen_US
dc.format.extent5 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/m2tsvx-gsnb
dc.identifier.urihttp://hdl.handle.net/11603/12330
dc.language.isoen_USen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectsecurity architectureen_US
dc.subjecttrust managementen_US
dc.subjectpervasive computingen_US
dc.subjectpublic key infrastructure (PKI)en_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleA Security Architecture Based on Trust Management for Pervasive Computing Systemsen_US
dc.typeTexten_US

Files

License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: