메뉴 건너뛰기




Volumn 12, Issue 1, 2007, Pages 79-92

Privacy-enhanced, Attack-resilient access control in pervasive computing environments with optional context authentication capability

Author keywords

Access control; Context authentication; Pervasive computing environment (PCE); Privacy; Security

Indexed keywords

DATA PRIVACY; MOBILE TELECOMMUNICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; USER INTERFACES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33846307093     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-006-0008-7     Document Type: Conference Paper
Times cited : (27)

References (36)
  • 1
    • 33847040187 scopus 로고    scopus 로고
    • Microsoft Research
    • Microsoft Research. Easy living. http://research.microsoft.com/ easyliving/
    • Easy living
  • 4
    • 33846314126 scopus 로고    scopus 로고
    • MIT project oxygen
    • MIT project oxygen, http://oxygen.lcs.mit.edu/
  • 5
    • 33846312620 scopus 로고    scopus 로고
    • National Institute of Standards and Technology NIST
    • National Institute of Standards and Technology (NIST), Pervasive Computing SmartSpace Laboratory. http://www.nist.gov/smartspace/
    • Pervasive Computing SmartSpace Laboratory
  • 6
    • 33846330334 scopus 로고    scopus 로고
    • Georgia Institute of Technology, home
    • Georgia Institute of Technology. The aware home, http://www.cc.gatech. edu/fce/ahri/
  • 8
    • 0010294632 scopus 로고    scopus 로고
    • Routing through the mist: Design and implementation
    • Technical report UIUCDCS-R-2002-2267, March
    • Al-Muhtadi J, Campbell R, Kapadia A, Mickunas D, Yi S (2002) Routing through the mist: design and implementation. Technical report UIUCDCS-R-2002-2267, March 2002
    • (2002)
    • Al-Muhtadi, J.1    Campbell, R.2    Kapadia, A.3    Mickunas, D.4    Yi, S.5
  • 11
    • 33846296763 scopus 로고    scopus 로고
    • Proxy-based security protocols in networked mobile devices
    • Madrid, Spain
    • Burnside M et al (2002) Proxy-based security protocols in networked mobile devices. In: ACM SAC 2002, Madrid, Spain
    • (2002) ACM SAC
    • Burnside, M.1
  • 12
    • 84945135810 scopus 로고    scopus 로고
    • Efficient nontransferable anonymous multi-show credential system with optional anonymity revocation
    • Advances in cryptology, EUROCRYPT, Springer, Berlin Heidelberg New York, pp
    • Camenisch J, Lysyanskaya A (2001) Efficient nontransferable anonymous multi-show credential system with optional anonymity revocation. In: Advances in cryptology, EUROCRYPT. LNCS 2045, Springer, Berlin Heidelberg New York, pp 93-118
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 0001604533 scopus 로고
    • Blind signatures for untraceable payments
    • Chaum D, Rivest RL, Sherman AT eds, Plenum, New York, pp
    • Chaum D (1982) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) Advances in cryptology proceedings of crypto, vol 82. Plenum, New York, pp 199-203
    • (1982) Advances in cryptology proceedings of crypto , vol.82 , pp. 199-203
    • Chaum, D.1
  • 15
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun ACM 24(2):84-88
    • (1981) Commun ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 16
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make Big Brother obsolete
    • Chaum D (1985) Security without identification: transaction systems to make Big Brother obsolete. Commun ACM 28(10):1030-1044
    • (1985) Commun ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 17
    • 35048858870 scopus 로고    scopus 로고
    • Authentication for pervasive computing
    • Security in pervasive computing 2003, Springer, Berlin Heidelberg New York, pp
    • Creese S et al (2004) Authentication for pervasive computing. In: Security in pervasive computing 2003. LNCS 2803, Springer, Berlin Heidelberg New York, pp 116-129
    • (2004) LNCS , vol.2803 , pp. 116-129
    • Creese, S.1
  • 18
    • 1642314732 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitiative analysis
    • San Diego, CA
    • Gruteser M, Grunwald D (2003) Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitiative analysis. In: WMASH03, San Diego, CA
    • (2003) WMASH03
    • Gruteser, M.1    Grunwald, D.2
  • 19
    • 2542616812 scopus 로고    scopus 로고
    • The quest for personal control over mobile location privacy
    • He Q et al (2004) The quest for personal control over mobile location privacy. IEEE Commun Mag 42(5):130-136
    • (2004) IEEE Commun Mag , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1
  • 21
    • 35048847641 scopus 로고    scopus 로고
    • Tackling security and privacy issues in radio frequency identification devices
    • PERVASIVE, Springer, Berlin Heidelberg New York, pp
    • Henrici D, Muller, P (2004) Tackling security and privacy issues in radio frequency identification devices. In: PERVASIVE 2004, LNCS 3001. Springer, Berlin Heidelberg New York, pp 219-224
    • (2004) LNCS , vol.3001 , pp. 219-224
    • Henrici, D.1    Muller, P.2
  • 24
    • 84937411601 scopus 로고    scopus 로고
    • Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: UbiComp 2002. LNCS 2498. Springer, Berlin Heidelberg New York, pp 237-245
    • Langheinrich M (2002) A privacy awareness system for ubiquitous computing environments. In: UbiComp 2002. LNCS 2498. Springer, Berlin Heidelberg New York, pp 237-245
  • 27
    • 33846331082 scopus 로고    scopus 로고
    • Park D (2001) Cryptographic protocols for third generation mobile communication systems. PhD thesis, Queensland University of Technology, Australia
    • Park D (2001) Cryptographic protocols for third generation mobile communication systems. PhD thesis, Queensland University of Technology, Australia
  • 28
    • 0017930809 scopus 로고
    • A Method for obtaining digital signatures and public-key cryptosystems
    • Rivest R, Shamir A, Adleman L (1978) A Method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21:120-126
    • (1978) Commun ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 30
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770-771
    • (1981) Commun ACM , vol.24 , Issue.11 , pp. 770-771
    • Lamport, L.1
  • 32
    • 33746373934 scopus 로고    scopus 로고
    • A novel privacy preserving authentication and access control scheme in pervasive computing environments
    • July
    • Ren K, Lou W, Deng R, Kim K (2006) A novel privacy preserving authentication and access control scheme in pervasive computing environments. IEEE Trans Veh Technol 55(4):1373-1384, July
    • (2006) IEEE Trans Veh Technol , vol.55 , Issue.4 , pp. 1373-1384
    • Ren, K.1    Lou, W.2    Deng, R.3    Kim, K.4
  • 33
    • 0001853125 scopus 로고
    • The computer for the 21st century
    • Weiser M (1991) The computer for the 21st century. Sci Am 265(3)94-104
    • (1991) Sci Am , vol.265 , Issue.3 , pp. 94-104
    • Weiser, M.1
  • 35
    • 33847038971 scopus 로고    scopus 로고
    • Anonymity for users of ubiquitous computing
    • Seattle, October 2003
    • Zugenmaier A, Hohl A (2003) Anonymity for users of ubiquitous computing. In: Security workshop, UbiComp 2003, Seattle, October 2003
    • (2003) Security workshop, UbiComp
    • Zugenmaier, A.1    Hohl, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.