TY - GEN
T1 - Context and location-aware encryption for pervasive computing environments
AU - Al-Muhtadi, Jalal
AU - Hill, Raquel
AU - Campbell, Roy
AU - Mickunas, M. Dennis
PY - 2006
Y1 - 2006
N2 - Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the notion of such environments is the capturing of location and context information. Context awareness and validation enables significant functionality to pervasive computing applications, users, resources and the ways they interact. Much of this functionality depends on validating context information and using it for granting access to data or resources. In this paper we propose an encryption and access control framework that uses both context and identity to determine whether an entity or a group of entities may access protected services, data, devices, and other resources. We assume that the resources are context-sensitive, thus requiring the requesting entity to be under a specific context before it is able to access the resource or decrypt the information. Our approach is unique in the way that we decouple context from identity, which adds extra security, facilitates value-added services, and enables efficient key management for group communication.
AB - Pervasive computing promises to revolutionize computing, empower mobile users, and enhance mobility, customizability and adaptability of computing environments. Intrinsic to the notion of such environments is the capturing of location and context information. Context awareness and validation enables significant functionality to pervasive computing applications, users, resources and the ways they interact. Much of this functionality depends on validating context information and using it for granting access to data or resources. In this paper we propose an encryption and access control framework that uses both context and identity to determine whether an entity or a group of entities may access protected services, data, devices, and other resources. We assume that the resources are context-sensitive, thus requiring the requesting entity to be under a specific context before it is able to access the resource or decrypt the information. Our approach is unique in the way that we decouple context from identity, which adds extra security, facilitates value-added services, and enables efficient key management for group communication.
UR - http://www.scopus.com/inward/record.url?scp=33750310547&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33750310547&partnerID=8YFLogxK
U2 - 10.1109/PERCOMW.2006.33
DO - 10.1109/PERCOMW.2006.33
M3 - Conference contribution
AN - SCOPUS:33750310547
SN - 0769525202
SN - 9780769525204
T3 - Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
SP - 284
EP - 289
BT - Proceedings - Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
PB - IEEE Computer Society
T2 - 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006
Y2 - 13 March 2006 through 17 March 2006
ER -