期刊文献+

Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI 被引量:1

Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI
下载PDF
导出
摘要 Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems. Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bidirectional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
出处 《Journal of Donghua University(English Edition)》 EI CAS 2008年第5期564-570,共7页 东华大学学报(英文版)
基金 Supported by the Ministry of Educationin China (No.104086)
关键词 ubiquitous computing identity authentication mechanism D-S Evidence Theory SPKI/SDSI SECURITY 计算机网络 网络安全 防火墙 网络检测系统
  • 相关文献

参考文献10

  • 1D.Sun,and Q. Cao.UCAIPM: Ubiquitous Computing Agile Information Protection Mechanism[].International Journal of Communications.2007
  • 2K Herrmann,M.A. Jaeger.PAYFLUX-Secure Electronic Payment in Mobile Ad Hoc Networks[].th International Conference on Information and Communications Security (ICICS ).2004
  • 3D. Sun,J . Pan,Q. Cao,et al.Ubiquitous Computing Service Model Based on SPKI/SDSI[].Dynamics of Continuous Discrete and I mpulsive System Series B.2006
  • 4D. Sun,and Q. Cao.UCCSSM: Ubiquitous Computing Context-aware Service Supply Mechanis m [ J ][].International Journal of Mathematics and Computers in Si mulation.2007
  • 5J . Biskup,S . Wort mann.Towards a Credential-Based I mplementation of Compound Access Control Policies[].Proceedings on the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT ).2004
  • 6D.Sun,H. Cai,Q. Cao,et al.Ubiquitous Computing Trust MechanismBased On D-S Evidence Theory[].Dynamics of Continuous Discrete and Impulsive System Series B.2006
  • 7'Information Technology-Open Systems interconnection-The Directory: Authentication Framework.'. ITU-T Recommendation X.509(1997)|ISO/IEC 9594-8 . 1997
  • 8Dempster A P.Upper and lower probability induced by a multivalued mapping[].Annals Mathematical Statistics.1967
  • 9Shafer,G.A. Mathematical theory of Evidence . 1976
  • 10R. Rivest,and B. Lampson.SDSI — a simple distributed security infrastructure. http://theory.lcs.mit.edu/rivest/sdsi11.html . 1996

同被引文献3

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部