|
|
|
|
Access control using threshold cryptography for ubiquitous computing environments
|
|
|
|
|
|
|
|
نویسنده
|
Al-Muhtadi Jalal ,Hill Raquel ,Al-Rwais Sumayah
|
|
منبع
|
journal of king saud university - computer and information sciences - 2011 - دوره : 23 - شماره : 2 - صفحه:71 -78
|
|
چکیده
|
Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday tasks. it extends everyday computing into the physical world, creating computationally smart environments that feature seamless interactions and automation. as a result of the highly distributed nature of ubiquitous computing, it is essential to develop security mechanisms that lend themselves well to the delicate properties of smart ubiquitous computing environments. in this paper, we introduce a context-aware access control mechanism that utilizes threshold cryptography and multilayer encryption to provide a dynamic and truly distributed method for access control. we simulate our access control scheme and show that access control decisions can be made in a timely manner even as we increase key and file sizes. this mechanism is closely coupled with the context-capturing services and security policy service resulting in a fully context-aware and seamless access control mechanism for typical ubiquitous computing scenarios.
|
|
کلیدواژه
|
Access control; Ubiquitous computing; Pervasive computing; Threshold cryptography
|
|
آدرس
|
King Saud University, College of Computer and Information Sciences, Saudi Arabia, Indiana University, School of Informatics and Computing, USA, King Saud University, College of Computer and Information Sciences, Saudi Arabia
|
|
پست الکترونیکی
|
salrwais@ksu.edu.sa
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Authors
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|