A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
dc.contributor.author | Undercoffer, Jeffrey | |
dc.contributor.author | Perich, Filip | |
dc.contributor.author | Cedilnik, Andrej | |
dc.contributor.author | Kagal, Lalana | |
dc.contributor.author | Joshi, Anupam | |
dc.date.accessioned | 2018-12-19T20:11:34Z | |
dc.date.available | 2018-12-19T20:11:34Z | |
dc.date.issued | 2003-10-12 | |
dc.description.abstract | Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere - anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certi cates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad-hoc. | en_US |
dc.description.uri | https://dl.acm.org/citation.cfm?id=772054 | en_US |
dc.format.extent | 12 pages | en_US |
dc.genre | journal articles preprints | en_US |
dc.identifier | doi:10.13016/m2cele-q69y | |
dc.identifier.citation | Filip Perich, Andrej Cedilnik, Lalana Kagal, and Anupam Joshi, A Secure Infrastructure for Service Discovery and Access in Pervasive Computing, Mobile Networks and Applications - Security in mobile computing environments archive Volume 8 Issue 2, April 2003 , DOI : 10.1023/A:1022224912300 | en_US |
dc.identifier.uri | 10.1023/A:1022224912300 | |
dc.identifier.uri | http://hdl.handle.net/11603/12323 | |
dc.language.iso | en_US | en_US |
dc.publisher | ACM | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department Collection | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Student Collection | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | This is a pre-print of an article published in Mobile Networks and Applications. The final authenticated version is available online at: https://doi.org/10.1023/A:1022224912300 | |
dc.subject | service discovery | en_US |
dc.subject | pervasive computing | en_US |
dc.subject | secure infrastructure | en_US |
dc.subject | UMBC Ebiquity Research Group | en_US |
dc.subject | distributed services | en_US |
dc.subject | smartcards | en_US |
dc.subject | extensible markup language | en_US |
dc.title | A Secure Infrastructure for Service Discovery and Access in Pervasive Computing | en_US |
dc.type | Text | en_US |