[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1133058.1133068acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Integrating presence inference into trust management for ubiquitous systems

Published: 07 June 2006 Publication History

Abstract

We propose a new architecture for trust management in ubiquitous environments that deals with RBAC policy, digital signatures, and user presence in a uniform framework. The proposed architecture includes inferences about user presence from incomplete sensor signals based on the hidden Markov model. We implemented a prototype system for a connection service in an office computer network with an RFID tag sensor system.Experimental results show that the proposed architecture is effective in providing both useful and secure services in a ubiquitous environment.

References

[1]
J. Al-Muhtadi, A. Ranganathan, R. Campbell and M. D. Mickunas, Cerberus: a context-aware security scheme for smart spaces, IEEE Int'l Conf. on Pervasive Computing and Communications (PerCom), 489--496, 2003.
[2]
E. Bertino, B. Catania, M. L. Damiani and P. Perlasca, GEO-RBAC: A spatially aware RBAC, 10th ACM Symp. on Access Control Models and Technologies (SACMAT), 29--37, June 2005.
[3]
M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management, IEEE Security and Privacy, 164--173, 1996.
[4]
M. Blaze, J. Feigenbaum, J. Ioannidis and A. Keromytis, The KeyNote trust-management system, RFC 2704, 1999.
[5]
M. J. Covington, W. Long, S. Srinivasan, A. K. Dey, M. Ahamad and G. D. Abowd, Securing context-aware applications using environment roles, 6th ACM Symp. on Access Control Models and Technologies (SACMAT), 10--20, May 2001.
[6]
C. M. Ellison, B. Frantz, B. Lampson, R. L. Rivest, B. M. Thomas and T. Ylonen, SPKI certificate theory, RFC 2693, 1999.
[7]
D. Fox, J. Hightower, L. Liao, D. Schulz, and G. Borriello, Bayesian filtering for location estimation, IEEE Pervasive Computing, 2(3), 24--33, 2003.
[8]
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor and Y. Ravid, Access control meets public key infrastructure, or, assigning roles to strangers, IEEE Security and Privacy, 2--14, 2000.
[9]
R. J. Hulsebosch, A. H. Salden, M. S. Bargh, P. W. G. Ebben and J. Reitsma, Context sensitive access control, 10th ACM Symp. on Access Control Models and Technologies (SACMAT), 111--119, June 2005.
[10]
J. Krumm, G. Cermak, and E. Horvitz, RightSPOT: a novel sense of location for a smart personal object, UbiComp 2003, LNCS 2864, 36--43, 2003.
[11]
J. Krumm, L. Williams, and G. Smith, SmartMoveX on a graph --- an inexpensive active badge tracker, UbiComp 2002, LNCS 2498, 299--307, 2002.
[12]
D. J. Patterson, L. Liao, D. Fox, and H. Kautz, Inferring high-level behavior from low-level sensors, UbiComp 2003, LNCS 2864, 73--89, 2003.
[13]
L. R. Rabiner and B. H. Juang, An introduction to hidden Markov models, IEEE ASSP Magazine, 3(1), 4--16, 1986.
[14]
J. Rosenberg, A presence event package for the Session Initiation Protocol (SIP), RFC 3856, 2004.
[15]
K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills and L. Yu, Requirements for policy languages for trust negotiation, IEEE Int'l Workshop on Policies for Distributed Systems and Networks (POLICY), 68--79, 2002.
[16]
Y. Yu, M. Winslett and K. E. Seamons, Interoperable strategies in automated trust negotiation, 8th ACM Conf. on Computer and Communications Security (CCS), 146--155, 2001.

Cited By

View all
  • (2013)An Authentication Method with Spatiotemporal Interval and Partial MatchingProceedings of the 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing10.1109/SNPD.2013.29(535-542)Online publication date: 1-Jul-2013
  • (2010)A new trust model using Hidden Markov Model based mixture of experts2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)10.1109/CISIM.2010.5643457(502-507)Online publication date: Oct-2010
  • (2007)Decentralized Trust Management based on the Reputation of Information Sources2007 IEEE International Conference on Networking, Sensing and Control10.1109/ICNSC.2007.372779(212-217)Online publication date: Apr-2007
  • Show More Cited By

Index Terms

  1. Integrating presence inference into trust management for ubiquitous systems

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
      June 2006
      256 pages
      ISBN:1595933530
      DOI:10.1145/1133058
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 June 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. presence inference
      2. trust management
      3. ubiquitous

      Qualifiers

      • Article

      Conference

      SACMAT06
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2013)An Authentication Method with Spatiotemporal Interval and Partial MatchingProceedings of the 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing10.1109/SNPD.2013.29(535-542)Online publication date: 1-Jul-2013
      • (2010)A new trust model using Hidden Markov Model based mixture of experts2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)10.1109/CISIM.2010.5643457(502-507)Online publication date: Oct-2010
      • (2007)Decentralized Trust Management based on the Reputation of Information Sources2007 IEEE International Conference on Networking, Sensing and Control10.1109/ICNSC.2007.372779(212-217)Online publication date: Apr-2007
      • (2007)Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous SystemsProceedings of the Future Generation Communication and Networking - Volume 0210.1109/FGCN.2007.152(71-75)Online publication date: 6-Dec-2007

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media