The Community for Technology Leaders
Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on (2010)
Hong Kong, China
Dec. 11, 2010 to Dec. 13, 2010
ISBN: 978-0-7695-4322-2
pp: 695-702
Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data to support dynamically changing access control permissions. We present several models of our access control infrastructure and evaluate how well each design distributes trust and limits the behavior of misbehaving components. We also simulate the behavior of our threshold based access control scheme and evaluate the overhead of each infrastructure model.
trust, access control, pervasive computing, threshold cryptography

J. Al-Muhtadi, W. E. Byrd and R. Hill, "An Access Control Architecture for Distributing Trust in Pervasive Computing Environments," 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010)(EUC), Hong Kong, 2010, pp. 695-702.
96 ms
(Ver 3.3 (11022016))