Pervasive Authentication Domains for Automatic Pervasive Device Authorization

  • Authors:
  • Reiner Sailer;James R. Giles

  • Affiliations:
  • -;-

  • Venue:
  • PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a pervasive computing environment, users have many devicesthat are used to initiate or answer remote service requests,such as obtaining real-time stock quotes, handlingcorporate e-mail, or accepting telephone calls. We envisionthat in the future, many applications will be distributed, runningacross many of a user's specialized pervasive devicesrather than on a single system. In this case, a user needs theability to "log into" the personal pervasive domain whichspans each of the pervasive devices representing this user.In addition, the pervasive devices belonging to the user'spervasive domain must be able to represent this user to externalservices. We solve the problem of managing the authorizationfor pervasive devices belonging to a user's personalpervasive domain by introducing a central personalauthorization gateway that accompanies the user and allowspervasive devices in the user's pervasive domain to beautomatically configured and authorized.