Composition Trust Bindings in Pervasive Computing Service Composition

  • Authors:
  • John Buford;Rakesh Kumar;Greg Perkins

  • Affiliations:
  • Panasonic, Princeton, NJ, USA;Polytechnic University, Brooklyn, NY;Panasonic, Princeton, NJ, USA

  • Venue:
  • PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition trust binding is a prescriptive set of rules which defines the combination of allowable components for a particular service or application. Composition trust bindings can be used to protect both the service invocation path as well as the content handling path. The subsidiary relationships addressed by a composition trust binding are typically transparent today, but represent potential security exposure in pervasive computing systems because the subsidiary services or components may have security vulnerabilities. We define the composition trust binding and illustrate its use in the context of rights management and distributed search in personal content publishing. We compare this approach to existing authentication and authorization methods in service composition.