Trust and authorization in pervasive B2E scenarios

Bussard, Laurent;Roudier, Yves;Kilian-Kehr, Roger;Crosta, Stefano
ISC 2003, 6th Information Security Conference, October 1-3, 2003, Bristol, UK / Also published as LNCS, Volume 2851

Many pervasive and ubiquitous application scenarios consider the interaction of users with surrounding devices o ering services anywhere and anytime as one of the main future challenges. However, before this vision becomes reality, many security issues have to be solved. More specifically, the problem of trustworthiness of unknown devices is one of the major obstacles hindering the acceptance of pervasive applications.  This paper focuses on solutions for business-to-employee scenarios,  a particular sub-domain of the ubiquitous computing paradigm in which  valuable a priori trust information is available. Mechanisms and protocols are introduced to assess the trustworthiness of devices federated around a mobile user, and to allow for the delegation of authorizations
between such devices. The first results of a prototype implementation are finally presented.


DOI
Type:
Conference
City:
Bristol
Date:
2003-10-01
Department:
Digital Security
Eurecom Ref:
1178
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in ISC 2003, 6th Information Security Conference, October 1-3, 2003, Bristol, UK / Also published as LNCS, Volume 2851 and is available at : http://dx.doi.org/10.1007/10958513_23
See also:

PERMALINK : https://www.eurecom.fr/publication/1178