The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Access Control in Mobile and Ubiquitous Environments
Abstract
Access control is the process of granting permissions in accordance to an authorization policy. Mobile and ubiquitous environments challenge classical access control solutions like Role-Based Access Control. The use of context-information during policy definition and access control enforcement offers more adaptability and flexibility needed for these environments. When it comes to low-power devices, such as wireless sensor networks, access control enforcement is normally too heavy for such resource-constrained devices. Lightweight cryptography allows encrypting the data right from its production and the access is therefore intrinsically restricted. In addition, all access control mechanisms require an authenticated user. Traditionally, user authentication is performed by means of a combination of authentication factors, statically specified in the access control policy of the authorization service. Within ubiquitous and mobile environment, there is a clear need for a flexible user authentication using the available authentication factors. In this chapter, different new techniques to ensure access control are discussed and compared to the state-of-the-art.
Related Content
Bin Guo, Yunji Liang, Zhu Wang, Zhiwen Yu, Daqing Zhang, Xingshe Zhou.
© 2014.
20 pages.
|
Yunji Liang, Xingshe Zhou, Bin Guo, Zhiwen Yu.
© 2014.
31 pages.
|
Igor Bisio, Alessandro Delfino, Fabio Lavagetto, Mario Marchese.
© 2014.
33 pages.
|
Kobkaew Opasjumruskit, Jesús Expósito, Birgitta König-Ries, Andreas Nauerz, Martin Welsch.
© 2014.
22 pages.
|
Viktoriya Degeler, Alexander Lazovik.
© 2014.
23 pages.
|
Vlasios Kasapakis, Damianos Gavalas.
© 2014.
26 pages.
|
Zhu Wang, Xingshe Zhou, Daqing Zhang, Bin Guo, Zhiwen Yu.
© 2014.
18 pages.
|
|
|