کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
484036 | 703136 | 2011 | 8 صفحه PDF | دانلود رایگان |
![عکس صفحه اول مقاله: Access control using threshold cryptography for ubiquitous computing environments Access control using threshold cryptography for ubiquitous computing environments](/preview/png/484036.png)
Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday tasks. It extends everyday computing into the physical world, creating computationally smart environments that feature seamless interactions and automation. As a result of the highly distributed nature of ubiquitous computing, it is essential to develop security mechanisms that lend themselves well to the delicate properties of smart ubiquitous computing environments. In this paper, we introduce a context-aware access control mechanism that utilizes threshold cryptography and multilayer encryption to provide a dynamic and truly distributed method for access control. We simulate our access control scheme and show that access control decisions can be made in a timely manner even as we increase key and file sizes. This mechanism is closely coupled with the context-capturing services and security policy service resulting in a fully context-aware and seamless access control mechanism for typical ubiquitous computing scenarios.
Journal: Journal of King Saud University - Computer and Information Sciences - Volume 23, Issue 2, July 2011, Pages 71–78