Role-Based Access Control Models
Computer
Some thoughts on agent trust and delegation
Proceedings of the fifth international conference on Autonomous agents
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
ICITA '05 Proceedings of the Third International Conference on Information Technology and Applications (ICITA'05) Volume 2 - Volume 02
ICWS '05 Proceedings of the IEEE International Conference on Web Services
A delegation framework for federated identity management
Proceedings of the 2005 workshop on Digital identity management
XML-based access control languages
Information Security Tech. Report
Distributed authorization framework for mobile agents
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
The computer for the 21st Century
IEEE Pervasive Computing
Hi-index | 0.00 |
In pervasive environments, the connected devices can be aware the status of users and provide the information to users automatically in anytime, anywhere. However these require more security technologies to protect private information. The users must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety and user privacy in pervasive computing environments. In order to provide safety and user privacy, XML-based encryption and a digital signature mechanism needs to be efficiently integrated. In this paper, we propose access control mechanism based on eXtensible Access Control Markup Language (XACML) in order to manage the services and policies. We also extend SAML, in order to declare delegation assertions transferred to service providers by delegation among agents.