University of Hertfordshire

By the same authors

A Domain-Oriented Approach for Access Control in Pervasive Environments

Research output: Chapter in Book/Report/Conference proceedingConference contribution


View graph of relations
Original languageEnglish
Title of host publicationIn: Proceedings of the IEEE/IFIP Int Conf on Embedded and Ubiquitous Computing (EUC'08) Vol.2
ISBN (Print)978-0-7695-3492-3
Publication statusPublished - 2008


Pervasive computing envisions an environment in which we are surrounded by many embedded computer devices. Those networked devices provide us with a mobile, spontaneous and dynamic way to access various resources provided by domains with different security policies. The conventional approach to secure access over multiple domains is to implement a universal trusted infrastructure, extending local identity- or capability-based security systems and combining them with cross-domain authentication mechanisms. However, this does not adequately meet the security requirements of communicating with strangers in pervasive environments. This paper presents an intrinsically multi-domain oriented approach which incorporates an identity-based encryption (IBE) access control mechanism. This approach allows the right domain to get involved with its local playerspsila interactions by helping them to convert a token to a usable access capability, whilst facilitating revocation.


“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder." “Copyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”

ID: 87850