View : 687 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author이상호*
dc.contributor.author박소영*
dc.date.accessioned2016-08-28T11:08:30Z-
dc.date.available2016-08-28T11:08:30Z-
dc.date.issued2005*
dc.identifier.isbn3540308032*
dc.identifier.isbn9783540308034*
dc.identifier.issn0302-9743*
dc.identifier.otherOAK-12856*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/228921-
dc.description.abstractIn ubiquitous computing environments, a user can utilize a certain service in anywhere and anytime using any devices, then authentication and authorization are crucial for security in pervasive computing. In this paper, we propose a new ID-based access control model adequate for ubiquitous computing. We eliminate the use of X.509 certificates of trusted parties for authentication and allow ID-based authority delegations for flexible access control in distributed networks. We implement our proposed model using a bilinear map such as Weil pairing, and we prove the security of the proposed model against chosen-message attack under the random oracle model. © IFIP International Federation for Information Processing 2005.*
dc.languageEnglish*
dc.titleID-based access control and authority delegations*
dc.typeConference Paper*
dc.relation.volume3823 LNCS*
dc.relation.indexSCOPUS*
dc.relation.startpage884*
dc.relation.lastpage893*
dc.relation.journaltitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)*
dc.identifier.doi10.1007/11596042_91*
dc.identifier.wosidWOS:000235802200091*
dc.identifier.scopusid2-s2.0-33744929641*
dc.author.googlePark S.-Y.*
dc.author.googleLee S.-H.*
dc.contributor.scopusid이상호(56812941400)*
dc.contributor.scopusid박소영(40561657700)*
dc.date.modifydate20240325111712*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE