2011
DOI: 10.1016/j.jksuci.2011.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Access control using threshold cryptography for ubiquitous computing environments

Abstract: Ubiquitous computing is revolutionizing the way humans interact with machines and carry out everyday tasks. It extends everyday computing into the physical world, creating computationally smart environments that feature seamless interactions and automation. As a result of the highly distributed nature of ubiquitous computing, it is essential to develop security mechanisms that lend themselves well to the delicate properties of smart ubiquitous computing environments. In this paper, we introduce a context-aware… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…As a consequence of the extremely distributed nature of ubiquitous calculating, it is important to expand safety mechanisms that lend themselves well to the slight properties of smart ubiquitous calculating environments. In this paper J Al-Muhtadi et al [25] introduce a context-aware access control mechanism that employs threshold cryptography and multilayer encryption to offer a dynamic and really dispersed method for access control. They…”
Section: Literature Surveymentioning
confidence: 99%
“…As a consequence of the extremely distributed nature of ubiquitous calculating, it is important to expand safety mechanisms that lend themselves well to the slight properties of smart ubiquitous calculating environments. In this paper J Al-Muhtadi et al [25] introduce a context-aware access control mechanism that employs threshold cryptography and multilayer encryption to offer a dynamic and really dispersed method for access control. They…”
Section: Literature Surveymentioning
confidence: 99%
“…The context service processes sensor data to derive high level context. The event service provides secure communication among components within the system [22].…”
Section: Sensor Perspectivementioning
confidence: 99%
“…Context-aware access control merges data from multiple context sensors and uses this data to determine whether users should be given access to context restricted resources. Encryption is used to restrict access to data resources [22]. The idea of encrypting sensitive data is done based on the confidential or secret levels such as SECRET and TOP SECRET.…”
Section: Perspectives Of Managing Mobile Service Security Risksmentioning
confidence: 99%
See 1 more Smart Citation
“…To recover the secret a pre-specified number of parties must collaborate in order to obtain the secret. A threshold scheme of ( , ) means that a secret is divided among parties however any parties out of the parties can jointly obtain the secret [4]. The private key of the service is divided into shares ( 1, 2, .…”
Section: Threshold Cryptographymentioning
confidence: 99%