Ubiquitous authorization scheme based on device profile

  • Authors:
  • Kevin Tham;Mark Looi;Ernest Foo

  • Affiliations:
  • Information Security Research Centre, Queensland University of Technology, Brisbane, Australia;Information Security Research Centre, Queensland University of Technology, Brisbane, Australia;Information Security Research Centre, Queensland University of Technology, Brisbane, Australia

  • Venue:
  • EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

The range of devices that are capable of connecting to data networks has been on a rise in recent times. From the perspective of an administrator, controlling access to data networks, via these devices, usually includes the creation of separate login credentials. This leads to an administrative nightmare, from both the user and administrator’s point of view. This paper proposes a novel approach to this problem and offers a single-sign-on system, where the user’s authorisation is based on the login credentials of the user, and the profile of the device the user is using. An instance of this design is presented with SESAME, to demonstrate the usefulness of the design, and also practicality for implementation.