2003
DOI: 10.1109/tsmca.2003.819917
|View full text |Cite
|
Sign up to set email alerts
|

Achieving secure and flexible M-services through tickets

Abstract: Abstract-WebThis paper describes a secure and flexible access control scheme and protocol for M-services based on role based access control (RBAC). The access control architecture involves a Trusted Credential Center (TCC), a Trusted Authentication and Registration Center (TARC) and a secure ticket based mechanism for service access. Users and service providers register with the TARC and are authenticated. Based on this, tickets are issued by the TCC to users. Tickets carry authorization information needed for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 49 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…This scheme [ 2 ] used the Schnorr [ 4 ] signature scheme and Zheng [ 5 ] signature encryption scheme to propose a strong designated verifier signature scheme, which achieves signer identity privacy by avoiding the use of encryption algorithms and further improves the efficiency of signing and verification. A secure and flexible access control scheme and protocol for M-services based on role based access control (RBAC) [ 6 ] in the same year. In 2004, Laguillaumie et al [ 7 ] provided the first formal description of the concept of designated verifier signatures and a formal definition of the signer identity privacy property in strong designated verifier signatures.…”
Section: Related Workmentioning
confidence: 99%
“…This scheme [ 2 ] used the Schnorr [ 4 ] signature scheme and Zheng [ 5 ] signature encryption scheme to propose a strong designated verifier signature scheme, which achieves signer identity privacy by avoiding the use of encryption algorithms and further improves the efficiency of signing and verification. A secure and flexible access control scheme and protocol for M-services based on role based access control (RBAC) [ 6 ] in the same year. In 2004, Laguillaumie et al [ 7 ] provided the first formal description of the concept of designated verifier signatures and a formal definition of the signer identity privacy property in strong designated verifier signatures.…”
Section: Related Workmentioning
confidence: 99%
“…In the present era, data assumes a critical role in the daily lives of individuals [1][2][3][4][5][6]. The dissemination and utilization of data [7][8][9][10][11][12][13] have created enormous opportunities for decision-making and knowledge exploration [5,[14][15][16][17][18][19][20][21][22][23]. For instance, in 2006, Netflix released a dataset comprising 100 million movie ratings to enhance its recommendation system's performance [24].…”
Section: Introductionmentioning
confidence: 99%
“…Figure 2 represents the straggling device scenario where Device 3 takes more time delaying global model aggregation. The research work for preserving privacy has been a hot topic for many years [32][33][34] , it has also been discussed in edge framework [35] . In EFL, stragglers issue can intensify degradation of model performance as the participating devices are in millions and uncertain about their prolonged participation as well as their complete time dedication for model training.…”
Section: Introductionmentioning
confidence: 99%