Enforcing Policies in Pervasive Environments

dc.contributor.authorPatwardhan, Anand
dc.contributor.authorKorolev, Vladimir
dc.contributor.authorKagal, Lalana
dc.contributor.authorJoshi, Anupam
dc.date.accessioned2018-12-13T15:16:21Z
dc.date.available2018-12-13T15:16:21Z
dc.date.issued2004-08-22
dc.descriptionInternational Conference on Mobile and Ubiquitous Systems: Networking and Servicesen_US
dc.description.abstractThis paper presents a proof of concept implementation of a security infrastructure for mobile devices in a pervasive environment. The security infrastructure primarly consists of two parts, the policy engine and the policy enforcement mechanism. Each mobile device within a pervasive environment is equipped with its own policy enforcement mechanism and is responsible for protecting its resources. A mobile device consults the nearest policy server, notifies its current state including its present user, network presence, other accessible devices and location information if available. Using this information the policy server queries the Rei engine to dynamically create a policy certificate and issues it to the requesting device. The system wide policy is described in a semantic language Rei, a lightweight and extensible language that is able to express comprehensive policies using domain specific information. The Rei policy engine is able to dynamically decide what rights, prohibitions, obligations, dispensations an actor has on the domain actions. A policy certificate, which contains the set of granted permissions and the scope within which the permissions are valid, is created and issued to the device. The policy certificate can be revoked by the policy enforcer based on expiration of the validity period or a combination of timeout, loss of contact with an assigned network. X.509 based Public Key Infrastructure is used to provide identification and authentication.en_US
dc.description.sponsorshipThis research was supported in part by NSF awards 9875433 and 0242403, and a grant from NIST.en_US
dc.description.urihttps://ieeexplore.ieee.org/document/1331736en_US
dc.format.extent10 pagesen_US
dc.genreconference papers and proceedings preprintsen_US
dc.identifierdoi:10.13016/M2HM52P7K
dc.identifier.citationAnand Patwardhan, Vladimir Korolev, Lalana Kagal, and Anupam Joshi, Enforcing Policies in Pervasive Environments, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004., DOI: 10.1109/MOBIQ.2004.1331736en_US
dc.identifier.uri10.1109/MOBIQ.2004.1331736
dc.identifier.urihttp://hdl.handle.net/11603/12246
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.rights© 2004 IEEE
dc.subjectpolicyen_US
dc.subjectenvironmenten_US
dc.subjectubiquitous computingen_US
dc.subjectmobile computingen_US
dc.subjectmessage authenticationen_US
dc.subjectpublic key infrastructureen_US
dc.subjectrei policy engineen_US
dc.subjectsecurity infrastructureen_US
dc.subjectUMBC Ebiquity Research Groupen_US
dc.titleEnforcing Policies in Pervasive Environmentsen_US
dc.typeTexten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
108.pdf
Size:
182.85 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.56 KB
Format:
Item-specific license agreed upon to submission
Description: