DSM '04 Proceedings of the 1st international doctoral symposium on Middleware
Dynamically programmable and reconfigurable middleware services
Proceedings of the 5th ACM/IFIP/USENIX international conference on Middleware
Lessons learned from the deployment of a smartphone-based access-control system
Proceedings of the 3rd symposium on Usable privacy and security
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
A user study of policy creation in a flexible access-control system
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Symmetric identity federation for fixed-mobile convergence
Proceedings of the 4th ACM workshop on Digital identity management
Real life challenges in access-control management
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
Hi-index | 0.00 |
Personal servers are an attractive concept: People carryaround a device that takes care of computing, storage andcommunication on their behalf in a pervasive computing environment.So far personal servers have mainly been consideredfor accessing personal information. In this paper, weconsider personal servers in the context of a digital key system.Digital keys are an interesting alternative to physicalkeys for mail or good delivery companies whose employeesaccess tens of private buildings every day. In this paper,we present a digital key system tailored for the current incarnationof personal servers, i.e., a Bluetooth-enabled mobilephone. We describe how to use Bluetooth for this application,we present a simple authentication protocol and weprovide a detailled analysis of response time and energy consumptionon the mobile phone.