Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1102613.1102634acmotherconferencesArticle/Chapter ViewAbstractPublication PagesubimobConference Proceedingsconference-collections
Article

Authentification par la méfiance dans les systèmes pervasifs

Published: 31 May 2005 Publication History

Abstract

We present in this paper a solution to the difficult problem of authentication in pervasive environments. The distrust model developed hereafter allows a particular site to accept inbound connections from foreign unknown users, and to bound their access to a certain level in its own organization.

References

[1]
ITU-T Rec. X.509 (2000). ISO/IEC 9594-8 The Directory: Authentication Framework.
[2]
A. Abdul-Rahman and S. Hailes. A distributed trust model. In Proceedings of the ACM Workshop on New Security Paradigms, pages 48--60. SEP 97.
[3]
T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In Proceedings of the European Symposium on Research in Computer Security (ESORICS'94). NOV 94.
[4]
P. R. Zimmermann. The Official PGP User's Guide. MIT Press, Cambridge, MA, USA, 95.
[5]
Lalana Kagal, Tim Finin, and Anupam Joshi. Trust-based security in pervasive computing environments. IEEE Computer, pages 154.157. DEC 01.
[6]
Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta. Trust and Authorization in Pervasive B2E Scenarios. In Proceedings of 6th Information Security Conference (ISC'03) OCT 03.
[7]
Lalana Kagal, Tim Finin and Yun Peng, A delegation Based Model for Distributed Trust, Proceedings of the IJCAI-01 Workshop on Autonomy, Delegation, and Control: Interacting with Autonomous Agents, pp 73--80. AUG 01.
[8]
Florina Almenarez, Andres Marn, Celeste Campo, Carlos Garcia R PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In Proceedings of Workshop on Pervasive Security, Privacy and Trust (PSPT). AUG 04.
[9]
Rui He, Jianwei Niu,. Man Yuan,. Jianping Hu, A Novel Cloud-Based Trust Model for Pervasive Computing. In Proceedings of The Fourth International Conference on Computer and Information Technology (CIT'04) pp693--700. SEP 04.

Cited By

View all
  • (2008)Towards a new user Anonymity Preserving Protocol (APP) for MANETs2008 Third International Conference on Risks and Security of Internet and Systems10.1109/CRISIS.2008.4757485(243-248)Online publication date: Oct-2008

Index Terms

  1. Authentification par la méfiance dans les systèmes pervasifs

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      UbiMob '05: Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computing
      May 2005
      214 pages
      ISBN:1595931724
      DOI:10.1145/1102613
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 May 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. authentication
      3. pervasive environment
      4. security
      5. trust

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 19 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2008)Towards a new user Anonymity Preserving Protocol (APP) for MANETs2008 Third International Conference on Risks and Security of Internet and Systems10.1109/CRISIS.2008.4757485(243-248)Online publication date: Oct-2008

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media