Access control to people location information
ACM Transactions on Information and System Security (TISSEC)
Towards secure resource sharing for impromptu collaboration in pervasive computing
Proceedings of the 2007 ACM symposium on Applied computing
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Patient controlled encryption: ensuring privacy of electronic medical records
Proceedings of the 2009 ACM workshop on Cloud computing security
Managing pervasive environment privacy using the "fair trade" metaphor
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Securely disseminating RFID events
Proceedings of the 5th ACM international conference on Distributed event-based system
International Journal of Advanced Pervasive and Ubiquitous Computing
Hi-index | 0.00 |
Access control to confidential information in pervasive computing environments is challenging for multiple reasons: First, a client requesting access might not know which access rights are necessary in order to be granted access to the requested information. Second, access control must support flexible access rights that include context-sensitive constraints. Third, pervasive computing environments consist of a multitude of information services, which makes simple management of access rights essential. We discuss the shortcomings of existing access-control schemes that rely on either clients presenting a proof of access to a service or services encrypting information before handing the information over to a client. We propose a proofbased access-control architecture that employs hierarchical identity-based encryption in order to enable services to inform clients of the required proof of access in a covert way, without leaking information. Furthermore, we introduce an encryption-based access-control architecture that exploits hierarchical identity-based encryption in order to deal with multiple, hierarchical constraints on access rights. We present an example implementation of our proposed architectures and discuss the performance of this implementation.