Graphics gems IV
PGP source code and internals
XMl Security
A Context-Aware Security Architecture for Emerging Applications
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
A Service Selection Method Based on Context Types for a Ubiquitous Service System in a Public Space
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
Authentication and Access Control Agent Framework for Context-Aware Services
SAINT-W '05 Proceedings of the 2005 Symposium on Applications and the Internet Workshops
Practical Attacks on Proximity Identification Systems (Short Paper)
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
ICCIT '08 Proceedings of the 2008 Third International Conference on Convergence and Hybrid Information Technology - Volume 02
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
LRBAC: a location-aware role-based access control model
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Hi-index | 0.00 |
Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. We propose a hierarchical location and proximity based access framework to services using mobile devices. We then show that it is practically feasible to implement this framework using 'intelligent' mobile agents. We discuss the necessary security mechanisms and security protocols for such a framework and show that our framework is resilient to relay attacks. The developed location aware mobile agent is equipped with accurate source-of-location sensing that operates online and offline.