TY - GEN
T1 - Flexible delegation security for improved distribution in ubiquitous environments
AU - Kalogridis, Georgios
AU - Yeun, Chan Yeob
AU - Clemo, Gary
PY - 2003
Y1 - 2003
N2 - Since one of the services that delegation offers is a more optimised distribution paradigm, reconfigurable terminals are envisaged to be able to show how security can negotiate and adapt itself in a flexible way, in favour of performance, without nevertheless compromising fundamental security requirements. So far we observe that protocols that enable cascade delegation and maintain end-to-end accountability among all the involved actors, demonstrate heavy computations or increased network usage and unnecessary redundant complexity. With a novel set of delegation algorithms we show that it is possible to maintain end-to-end accountability and at the same time have compact and lightweight cascade characteristics. This has been further enhanced with an innovative security mechanism that can be automatically optimized in various environments. Due to these attributes, the proposed delegation algorithms will additionally enable reconfigurable terminals to perform complicated tasks either when they enter an untreated PAN or they use a slow communications link. These characteristics make our protocols suitable for ubiquitous environments as well as for diverse personalized services and mobile applications.
AB - Since one of the services that delegation offers is a more optimised distribution paradigm, reconfigurable terminals are envisaged to be able to show how security can negotiate and adapt itself in a flexible way, in favour of performance, without nevertheless compromising fundamental security requirements. So far we observe that protocols that enable cascade delegation and maintain end-to-end accountability among all the involved actors, demonstrate heavy computations or increased network usage and unnecessary redundant complexity. With a novel set of delegation algorithms we show that it is possible to maintain end-to-end accountability and at the same time have compact and lightweight cascade characteristics. This has been further enhanced with an innovative security mechanism that can be automatically optimized in various environments. Due to these attributes, the proposed delegation algorithms will additionally enable reconfigurable terminals to perform complicated tasks either when they enter an untreated PAN or they use a slow communications link. These characteristics make our protocols suitable for ubiquitous environments as well as for diverse personalized services and mobile applications.
KW - Cascade delegation
KW - Flexible security
KW - Multicasting delegation
KW - Ubiquitous distribution
UR - http://www.scopus.com/inward/record.url?scp=84904299571&partnerID=8YFLogxK
U2 - 10.1007/978-0-387-35691-4
DO - 10.1007/978-0-387-35691-4
M3 - Conference contribution
AN - SCOPUS:84904299571
SN - 9781475764895
T3 - IFIP Advances in Information and Communication Technology
SP - 361
EP - 372
BT - Security and Privacy in the age of Uncertainty - IFIP TC11 18th International Conference on Information Security, SEC 2003
T2 - IFIP TC11 18th International Conference on Information Security, SEC 2003
Y2 - 26 May 2003 through 28 May 2003
ER -