Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Multilateral security a concept and examples for balanced security
Proceedings of the 2000 workshop on New security paradigms
The smart floor: a mechanism for natural user identification and tracking
CHI '00 Extended Abstracts on Human Factors in Computing Systems
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Trust Metrics, Models and Protocols for Electronic Commerce Transactions
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Trusted Computing Platforms: TCPA Technology in Context
Trusted Computing Platforms: TCPA Technology in Context
The trouble with login: on usability and computer security in ubiquitous computing
Personal and Ubiquitous Computing
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
Bluetooth: vision, goals, and architecture
ACM SIGMOBILE Mobile Computing and Communications Review
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Ninja: non identity based, privacy preserving authentication for ubiquitous environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
SP'04 Proceedings of the 12th international conference on Security Protocols
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Look who's talking: authenticating service access points
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
TrustAC: trust-based access control for pervasive devices
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Hi-index | 0.00 |
This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and users granting access to service providers. The paper identifies three classes of problems addressed by existing work. Then, it teases out architectural patterns being used to address those problems, their assumptions, properties, and remaining challenges.