System Maintenance:
There may be intermittent impact on performance while updates are in progress. We apologize for the inconvenience.
By Topic

Provably secure anonymous access control for heterogeneous trusts

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Shin, K. ; Tokyo Univ., Japan ; Yasuda, H.

Privacy has been a central concern of ubiquitous (pervasive) computing. Although the boundary between privacy and publicity dynamically moves depending on the context in which the issue is considered, access control, which is one of the most fundamental functionality constituting ubiquitous computing, is required to support perfect privacy, that is, anonymity and unlinkability. This paper presents a concrete protocol for anonymous access control that supports compliance to the distributed trust management model introduced by Blaze et al, efficiency for continual verification and provable security. In addition, the protocol is based on a practical trust model that models the heterogeneous structure of trust in the real world. The model defines a service provider, a service appliance, users and a device that users carry or wear as independent players, and further assumes that trust between them is independently established only based on their arbitrary mutual agreements.

Published in:

Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on

Date of Conference:

20-22 April 2006