TY - GEN
T1 - A flexible, privacy-preserving authentication framework for ubiquitous computing environments
AU - Al-Muhtadi, J.
AU - Ranganathan, A.
AU - Campbell, R.
AU - Mickunas, M. D.
N1 - Publisher Copyright:
© 2002 IEEE.
PY - 2002
Y1 - 2002
N2 - The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users and computing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access control techniques and privacy preserving protocols. We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.
AB - The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users and computing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access control techniques and privacy preserving protocols. We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.
KW - Mist
KW - Ubiquitous computing
KW - authentication
KW - context-awareness
KW - privacy
KW - security
UR - http://www.scopus.com/inward/record.url?scp=84994338554&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84994338554&partnerID=8YFLogxK
U2 - 10.1109/ICDCSW.2002.1030861
DO - 10.1109/ICDCSW.2002.1030861
M3 - Conference contribution
AN - SCOPUS:84994338554
T3 - Proceedings - International Conference on Distributed Computing Systems
SP - 771
EP - 776
BT - Proceedings - 22nd International Conference on Distributed Computing Systems Workshops, ICDCSW 2002
A2 - Wagner, Roland
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 22nd International Conference on Distributed Computing Systems Workshops, ICDCSW 2002
Y2 - 2 July 2002 through 5 July 2002
ER -