A COLLABORATIVE SECURITY MECHANISM BASED ON REPUTATION AND TRUST LEVEL IN PERVASIVE SYSTEMS

Mohammed Nadir Djedid

2012

Abstract

The emergence of network technologies and the appearance of new varied applications in terms of services and resources, has created new security problems for which existing solutions and mechanisms are inadequate, especially problems of identification and authentication. In a highly distributed and pervasive system, a uniform and centralized security management is not an option. It then becomes necessary to give more autonomy to security systems by providing them with mechanisms that allows a dynamic and flexible cooperation and collaboration between the actors in the system.

References

  1. Girma, B., 2006. Thesis: Accès et adaptation de contenus multimédia pour les systèmes pervasifs. INSA Lyon.
  2. Rigney, C., Rubens, A., Simpson, W., Willens, S., 1997. RFC 2138: Remote Authentication Dial In User Service (RADIUS).
  3. Wiki.LemonLDAP,2007 http://wiki.lemonldap.objectweb.org.
  4. Recordon, D., Reed D., 2006. OpenID 2.0: a platform for user-centric identity management. In The 2nd ACM workshop on digital identity management, pp.11-16, ACM Press, Virginia, USA.
  5. Alsaleh, M., Adams, C., 2006. Enhancing Consumer Privacy in the Liberty Alliance identity Federation and Web Services Frameworks Workshop on Privacy Enhancing Technologies, pp. 59-77, Cambridge, UK.
  6. Shibboleth Development Team, 2009. Shibboleth Project, http://shibboleth.internet2.edu/.
  7. OASIS, 2004. Web Services Security Specification. http://www.oasis-open.org/.
  8. Thompson, M., Johnston, W., Mudumbai, S., Hoo, G., Jackson, K., Essiari, A., 1999. Certificate-based access control for widely distributed resources. In SSYM 0878: 8th Conference on USENIX Security Symposium, p.17, USENIX Association Berkeley, USA.
  9. Chadwick, D., Otenko, A., 2003. The PERMIS X.509 role based privilege management infrastructure. Future Generation Computer Systems Journal, Vol 19, No 2, pp.277-289.
  10. Pearlman, L., welch, V., Foster, I., Kasselman, C., Tuecke, S., 2002. A Community Authorization Service for Group Collaboration. In POLICY 0278: 3rd International workshop on policies for Distributed Sustems and Networks, pp.50-59, IEEE Computer Society, Washington, USA.
  11. Alferi, R., Cecchini, R., Ciaschini, V., Dell'Agnello, L., Frohner, A., Gianoli, A., Lörentey, K., Spataro., F., 2004. VOMS, an Authorization Systemm fort Virtual Organizations. In European Across Grids Conference, pp.33-40, Verlag, Spain.
  12. Cuppens, F., Nora cuppens-Boulahia C., 2006. O2O: Managing Security policy Interoperability with Virtual Private Organizations. In ICISS 0678. 2nd International Conference on Information Systems Security, pp. 101- 115, Kolkata, India.
  13. Seitz, L., Pierson, J., Brunie, L., 2005. Sygn : A certificate based access control in Grid environnements. Tech Rep. INSA Lyon, France.
  14. Roman, M., Hess, C., Cerqueira, R., Ranganathan, A., Campbel, R., Nahrstedt, K., 2002. Gaia: A Middleware Infrastructure for Active Spaces. In IEEE Pervasive Computing Vol.1, No 4, pp. 74-83.
  15. Giang, P., Hung, L., Lee, S., Lee, Y., Lee, H., 2007. A flexible Trust-based Access Control mechanism For Security and Privacy Enhancement in Ubiquitous Systems. In MUE 0778, International Conference on Multimedia and Ubiquitous Engineering, pp.698-703, IEEE Computer Society, Washington, USA.
Download


Paper Citation


in Harvard Style

Djedid M. (2012). A COLLABORATIVE SECURITY MECHANISM BASED ON REPUTATION AND TRUST LEVEL IN PERVASIVE SYSTEMS . In Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8565-00-6, pages 258-261. DOI: 10.5220/0003837902580261


in Bibtex Style

@conference{peccs12,
author={Mohammed Nadir Djedid},
title={A COLLABORATIVE SECURITY MECHANISM BASED ON REPUTATION AND TRUST LEVEL IN PERVASIVE SYSTEMS},
booktitle={Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2012},
pages={258-261},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003837902580261},
isbn={978-989-8565-00-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - A COLLABORATIVE SECURITY MECHANISM BASED ON REPUTATION AND TRUST LEVEL IN PERVASIVE SYSTEMS
SN - 978-989-8565-00-6
AU - Djedid M.
PY - 2012
SP - 258
EP - 261
DO - 10.5220/0003837902580261