Mostra el registre d'ítem simple
Pervasive authentication and authorization infrastructures for mobile users
dc.contributor.author | Forné Muñoz, Jorge |
dc.contributor.author | Hinarejos Campos, M. Francisca |
dc.contributor.author | Marin, Andres |
dc.contributor.author | Almenarez, Florina |
dc.contributor.author | Lopez, Javier |
dc.contributor.author | Montenegro, Jose Antonio |
dc.contributor.author | Lacoste, Marc |
dc.contributor.author | Diaz, Daniel |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica |
dc.date.accessioned | 2011-03-29T17:19:23Z |
dc.date.available | 2011-03-29T17:19:23Z |
dc.date.created | 2010 |
dc.date.issued | 2010 |
dc.identifier.citation | Forné, J. [et al.]. Pervasive authentication and authorization infrastructures for mobile users. "Computers and security", 2010, vol. 29, núm. 4, p. 501-514. |
dc.identifier.issn | 0167-4048 |
dc.identifier.uri | http://hdl.handle.net/2117/12164 |
dc.description.abstract | Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI). This choice allows the validation of credentials of users roaming between heterogeneous networks, even when global connectivity is lost and some services are temporarily unreachable. Proof-of-concept implementations and testbed validation results demonstrate that strong security can be achieved for users and applications through the combination of traditional PKI services with a number of enhancements like: (i) dynamic and collaborative trust model, (ii) use of attribute certificates for privilege management, and (iii) modular architecture enabling nomadic mobility and enhanced with reconfiguration capabilities. |
dc.format.extent | 14 p. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Informàtica::Seguretat informàtica |
dc.subject.lcsh | Ubiquitous computing |
dc.subject.lcsh | Authentication |
dc.title | Pervasive authentication and authorization infrastructures for mobile users |
dc.type | Article |
dc.subject.lemac | Seguretat informàtica |
dc.subject.lemac | Ordinadors, Xarxes d' -- Mesures de seguretat |
dc.contributor.group | Universitat Politècnica de Catalunya. SERTEL - Serveis Telemàtics |
dc.identifier.doi | 10.1016/j.cose.2009.09.001 |
dc.description.peerreviewed | Peer Reviewed |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 5393462 |
dc.description.version | Postprint (published version) |
local.citation.author | Forné, J.; Hinarejos, F.; Marin, A.; Almenarez, F.; Lopez, J.; Montenegro, J.; Lacoste, M.; Diaz, D. |
local.citation.publicationName | Computers and security |
local.citation.volume | 29 |
local.citation.number | 4 |
local.citation.startingPage | 501 |
local.citation.endingPage | 514 |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [480]
-
Articles de revista [56]