An access control architecture for distributing trust in pervasive computing environments. Hill, R., Al-Muhtadi, J., & Byrd, W., E. In Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010, pages 695-702, 2010. Website doi abstract bibtex Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data to support dynamically changing access control permissions. We present several models of our access control infrastructure and evaluate how well each design distributes trust and limits the behavior of misbehaving components. We also simulate the behavior of our threshold-based access control scheme and evaluate the overhead of each infrastructure model. © 2010 IEEE.
@inproceedings{
title = {An access control architecture for distributing trust in pervasive computing environments},
type = {inproceedings},
year = {2010},
keywords = {Access control,Access control architecture; Access control scheme,Cryptography; Distributed computer systems; Human},
pages = {695-702},
websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79951784001&doi=10.1109%2FEUC.2010.110&partnerID=40&md5=053eead1bf7fc45a84191cfbca79f1b9},
city = {Hong Kong},
id = {05f615d2-b75e-3903-bee4-73a3974d394d},
created = {2018-01-08T19:03:42.192Z},
file_attached = {false},
profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
last_modified = {2018-03-12T19:03:16.408Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Hill2010695},
source_type = {conference},
notes = {cited By 0; Conference of IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010 ; Conference Date: 11 December 2010 Through 13 December 2010; Conference Code:83896},
folder_uuids = {a0f5ac31-a393-4a7b-b7db-64a126a80f6e},
private_publication = {false},
abstract = {Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data to support dynamically changing access control permissions. We present several models of our access control infrastructure and evaluate how well each design distributes trust and limits the behavior of misbehaving components. We also simulate the behavior of our threshold-based access control scheme and evaluate the overhead of each infrastructure model. © 2010 IEEE.},
bibtype = {inproceedings},
author = {Hill, R and Al-Muhtadi, J and Byrd, W E},
doi = {10.1109/EUC.2010.110},
booktitle = {Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010}
}
Downloads: 0
{"_id":"RNvXdyc8Sd3w42vP9","bibbaseid":"hill-almuhtadi-byrd-anaccesscontrolarchitecturefordistributingtrustinpervasivecomputingenvironments-2010","downloads":0,"creationDate":"2018-03-12T19:10:28.070Z","title":"An access control architecture for distributing trust in pervasive computing environments","author_short":["Hill, R.","Al-Muhtadi, J.","Byrd, W., E."],"year":2010,"bibtype":"inproceedings","biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibdata":{"title":"An access control architecture for distributing trust in pervasive computing environments","type":"inproceedings","year":"2010","keywords":"Access control,Access control architecture; Access control scheme,Cryptography; Distributed computer systems; Human","pages":"695-702","websites":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-79951784001&doi=10.1109%2FEUC.2010.110&partnerID=40&md5=053eead1bf7fc45a84191cfbca79f1b9","city":"Hong Kong","id":"05f615d2-b75e-3903-bee4-73a3974d394d","created":"2018-01-08T19:03:42.192Z","file_attached":false,"profile_id":"42d295c0-0737-38d6-8b43-508cab6ea85d","last_modified":"2018-03-12T19:03:16.408Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Hill2010695","source_type":"conference","notes":"cited By 0; Conference of IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010 ; Conference Date: 11 December 2010 Through 13 December 2010; Conference Code:83896","folder_uuids":"a0f5ac31-a393-4a7b-b7db-64a126a80f6e","private_publication":false,"abstract":"Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data to support dynamically changing access control permissions. We present several models of our access control infrastructure and evaluate how well each design distributes trust and limits the behavior of misbehaving components. We also simulate the behavior of our threshold-based access control scheme and evaluate the overhead of each infrastructure model. © 2010 IEEE.","bibtype":"inproceedings","author":"Hill, R and Al-Muhtadi, J and Byrd, W E","doi":"10.1109/EUC.2010.110","booktitle":"Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010","bibtex":"@inproceedings{\n title = {An access control architecture for distributing trust in pervasive computing environments},\n type = {inproceedings},\n year = {2010},\n keywords = {Access control,Access control architecture; Access control scheme,Cryptography; Distributed computer systems; Human},\n pages = {695-702},\n websites = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-79951784001&doi=10.1109%2FEUC.2010.110&partnerID=40&md5=053eead1bf7fc45a84191cfbca79f1b9},\n city = {Hong Kong},\n id = {05f615d2-b75e-3903-bee4-73a3974d394d},\n created = {2018-01-08T19:03:42.192Z},\n file_attached = {false},\n profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},\n last_modified = {2018-03-12T19:03:16.408Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Hill2010695},\n source_type = {conference},\n notes = {cited By 0; Conference of IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010 ; Conference Date: 11 December 2010 Through 13 December 2010; Conference Code:83896},\n folder_uuids = {a0f5ac31-a393-4a7b-b7db-64a126a80f6e},\n private_publication = {false},\n abstract = {Pervasive computing infrastructure is highly distributed and it is essential to develop security mechanisms that enhance the security of the system by distributing trust among the various infrastructure components. We present a novel access control architecture explicitly designed to distribute trust that combines threshold cryptography, multi-layer encryption, and mediated access to contextual data to support dynamically changing access control permissions. We present several models of our access control infrastructure and evaluate how well each design distributes trust and limits the behavior of misbehaving components. We also simulate the behavior of our threshold-based access control scheme and evaluate the overhead of each infrastructure model. © 2010 IEEE.},\n bibtype = {inproceedings},\n author = {Hill, R and Al-Muhtadi, J and Byrd, W E},\n doi = {10.1109/EUC.2010.110},\n booktitle = {Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010}\n}","author_short":["Hill, R.","Al-Muhtadi, J.","Byrd, W., E."],"urls":{"Website":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-79951784001&doi=10.1109%2FEUC.2010.110&partnerID=40&md5=053eead1bf7fc45a84191cfbca79f1b9"},"biburl":"https://bibbase.org/service/mendeley/42d295c0-0737-38d6-8b43-508cab6ea85d","bibbaseid":"hill-almuhtadi-byrd-anaccesscontrolarchitecturefordistributingtrustinpervasivecomputingenvironments-2010","role":"author","keyword":["Access control","Access control architecture; Access control scheme","Cryptography; Distributed computer systems; Human"],"metadata":{"authorlinks":{}},"downloads":0},"search_terms":["access","control","architecture","distributing","trust","pervasive","computing","environments","hill","al-muhtadi","byrd"],"keywords":["access control","access control architecture; access control scheme","cryptography; distributed computer systems; human"],"authorIDs":[],"dataSources":["zgahneP4uAjKbudrQ","ya2CyA73rpZseyrZ8","2252seNhipfTmjEBQ"]}