Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06)
DOI: 10.1109/percomw.2006.33
|View full text |Cite
|
Sign up to set email alerts
|

Context and Location-Aware Encryption for Pervasive Computing Environments

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 9 publications
0
17
0
1
Order By: Relevance
“…Por otro lado, el cifrado basado en contexto también puede ser implantado mediante un servidor externo que haga las comprobaciones de contexto [5]. De esta manera, las comprobaciones del contexto se resuelven de forma externa, sin necesidad de que el árbol esté con el usuario o con el dato.…”
Section: Cifrado Basado En Contextounclassified
“…Por otro lado, el cifrado basado en contexto también puede ser implantado mediante un servidor externo que haga las comprobaciones de contexto [5]. De esta manera, las comprobaciones del contexto se resuelven de forma externa, sin necesidad de que el árbol esté con el usuario o con el dato.…”
Section: Cifrado Basado En Contextounclassified
“…Context-aware access control merges data from multiple context sensors and uses this data to determine whether users should be given access to context restricted resources. Our context-aware access control scheme extends the context-based encryption scheme that is presented in Al-Muhtadi et al (2006). In Al-Muhtadi et al (2006), encryption is used to restrict access to data resources.…”
Section: Approachmentioning
confidence: 99%
“…An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications themselves'' (Dey, 2001). In this paper, we incorporate threshold cryptography into the contextbased encryption mechanism presented in Al-Muhtadi et al (2006). In this work, we extend the use of context to provide context and location-based security mechanisms for providing confidentiality and restricting access.…”
Section: Introductionmentioning
confidence: 99%
“…In our prototype, the location of the terminal is determined by an off-board location provider that may use any technology deemed to be appropriate. Al-Muhtadi, et al [37] propose a location-aware access control system in which sensitive computer files are encrypted with a secret key that is accessible only in the region in which the files are to be accessed. This approach has some similarities to ours, in which a secret key is only made available if the conditions of a licence are satisfied.…”
Section: Related Workmentioning
confidence: 99%