Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
A framework for distributed authorization
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Generalized Beimal-Chor schemes for broadcast encryption and interactive key distribution
Theoretical Computer Science
Information Processing Letters
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
Grapevine: an exercise in distributed computing
Communications of the ACM
Efficient Security for Large and Dynamic Multicast Groups
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
SESAME V2 public key and authorisation extensions to Kerberos
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
A flexible distributed authorization protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
People, places, things: Web presence for the real world
WMCSA '00 Proceedings of the Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00)
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Key derivation for network management applications
IEEE Network: The Magazine of Global Internetworking
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
Security requirements in service oriented architectures for ubiquitous computing
MPAC '04 Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
Towards secure resource sharing for impromptu collaboration in pervasive computing
Proceedings of the 2007 ACM symposium on Applied computing
Evaluating confidence in context for context-aware security
AmI'07 Proceedings of the 2007 European conference on Ambient intelligence
A software framework for autonomic security in pervasive environments
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Practical security for disconnected nodes
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Some security issues of wireless systems
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Hi-index | 0.00 |
We present an infrastructure for flexible and secure access to a group of distributed services in a nomadic computing environment, wherein users access local services from their mobile, wirelessly connected devices. We describe a secure hand-off' protocol, which allows a user to register with a single service that hands off' authorization to access a subset of the services. Our protocol helps maintain the user's privacy. It allows the services (which may be implemented on simple appliances) and the user's mobile device to have modest resources: services do not have to be online to any party except the user's device and the storage and communication requirements are minimal. In addition to the hand-off protocol, the paper presents a model for authorization hand-off and describes related research and technologies.