Show simple item record

dc.contributor.authorLi, J.
dc.contributor.authorChristianson, B.
dc.date.accessioned2009-03-16T11:45:21Z
dc.date.available2009-03-16T11:45:21Z
dc.date.issued2008
dc.identifier.citationLi , J & Christianson , B 2008 , A Domain-Oriented Approach for Access Control in Pervasive Environments . in In: Proceedings of the IEEE/IFIP Int Conf on Embedded and Ubiquitous Computing (EUC'08) Vol.2 . Institute of Electrical and Electronics Engineers (IEEE) , pp. 278-284 . https://doi.org/10.1109/EUC.2008.57
dc.identifier.isbn978-0-7695-3492-3
dc.identifier.otherPURE: 87850
dc.identifier.otherPURE UUID: 93c6450c-6a27-4c99-9a76-a03317df634e
dc.identifier.otherdspace: 2299/3028
dc.identifier.otherScopus: 63449104327
dc.identifier.urihttp://hdl.handle.net/2299/3028
dc.description“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder." “Copyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”
dc.description.abstractPervasive computing envisions an environment in which we are surrounded by many embedded computer devices. Those networked devices provide us with a mobile, spontaneous and dynamic way to access various resources provided by domains with different security policies. The conventional approach to secure access over multiple domains is to implement a universal trusted infrastructure, extending local identity- or capability-based security systems and combining them with cross-domain authentication mechanisms. However, this does not adequately meet the security requirements of communicating with strangers in pervasive environments. This paper presents an intrinsically multi-domain oriented approach which incorporates an identity-based encryption (IBE) access control mechanism. This approach allows the right domain to get involved with its local playerspsila interactions by helping them to convert a token to a usable access capability, whilst facilitating revocation.en
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.ispartofIn: Proceedings of the IEEE/IFIP Int Conf on Embedded and Ubiquitous Computing (EUC'08) Vol.2
dc.titleA Domain-Oriented Approach for Access Control in Pervasive Environmentsen
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
rioxxterms.versionofrecordhttps://doi.org/10.1109/EUC.2008.57
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record