Xiao, Hannan, Malcolm, James A., Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2007) Hierarchical trustworthy authentication for pervasive computing. In: The 4th Annual International Conference on Mobile and Ubiquitous System: Computing, Networking and Services, 6-10 August 2007, Philadelphia, USA.
Preview |
PDF
Author-Accepted-Version.pdf - Accepted Version Download (268kB) | Preview |
Abstract
Conventional entity authentication is not enough to build a secure pervasive computing environment. Being sure that you are talking to the expected entity does not guarantee it is going to do what you expect him to do, and only that. This paper introduces a concept of “trustworthy authentication” in pervasive computing which is defined as entity authentication accompanied by an assurance of trustworthy behaviour of the authenticated entity. It discusses how to provide trustworthy authentication in pervasive computing using the example of a roaming customer wishing to print his email on a public printer. A two-level hierarchical trustworthy authentication scheme is proposed where local and higher-level authorization servers issue trustworthiness certificates after receiving trustworthiness records from the printer, signed by its users. The proposed scheme may be generalized for trustworthy authentication of security devices such as firewalls.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
ISBN: | 9781424410248 |
Identifier: | 10.1109/MOBIQ.2007.4450993 |
Page Range: | pp. 1-3 |
Identifier: | 10.1109/MOBIQ.2007.4450993 |
Additional Information: | © 2007 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Keywords: | Pervasive Computing, Ubiquitous Computing, Trustworthy authentication, Public Key Infrastructure |
Subjects: | Computing > Information security > Cyber security Computing > Information security Computing |
Related URLs: | |
Depositing User: | Ying Zhang |
Date Deposited: | 16 Jul 2019 16:50 |
Last Modified: | 04 Nov 2024 12:32 |
URI: | https://repository.uwl.ac.uk/id/eprint/6259 |
Downloads
Downloads per month over past year
Actions (login required)
View Item |