Sciweavers

PERCOM
2006
ACM

Exploiting information relationships for access control in pervasive computing

14 years 4 months ago
Exploiting information relationships for access control in pervasive computing
Many information services in pervasive computing offer rich information, which is information that includes other types of information. For example, the information listed in a person's calendar entry can reveal information about the person's location or activity. To avoid rich information from leaking its included information, we must consider the semantics of the rich information when controlling access to this information. Other approaches that reason about the semantics of information (e.g., based on Semantic Web rule engines) are based on a centralized design, whose drawback is a single point of failure. In this paper, we exploit information relationships for capturing the semantics of information. We identify three types of information relationships that are common and important in pervasive computing and integrate support for them in a distributed, certificate-based access control architecture. In the architecture, individuals can either define their own information r...
Urs Hengartner, Peter Steenkiste
Added 24 Dec 2009
Updated 24 Dec 2009
Type Conference
Year 2006
Where PERCOM
Authors Urs Hengartner, Peter Steenkiste
Comments (0)