{"title":"A Novel Trust Community Based on Direct Certifying for Pervasive Computing Systems","authors":"Zhiyu Peng, Shanping Li, Xin Lin","doi":"10.1109/CIS.2007.93","DOIUrl":null,"url":null,"abstract":"In the vision of pervasive computing, there are a great diversity of services in the environment and a great deal of nomadic users walking through them. The traditional proof-making mechanisms of access control are no longer appropriate for the new context, in which people expect to access information in a more flexible and non-intrusive way. Instead of asking people for the certificates, this paper advocates a direct certifying mechanism, in which delegation relationships are directly verified by asking the delegator. By dynamically discovering potential credential chains a trust community is maintained. Existed credential chain discovery methods are not scalable enough for that they either need collecting all credentials in the system or need referring to all the potential users. In our approach, each user keeps a trust list to reduce the fan-out of searching steps. The simulation shows that the performance is greatly improved.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"217 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2007.93","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In the vision of pervasive computing, there are a great diversity of services in the environment and a great deal of nomadic users walking through them. The traditional proof-making mechanisms of access control are no longer appropriate for the new context, in which people expect to access information in a more flexible and non-intrusive way. Instead of asking people for the certificates, this paper advocates a direct certifying mechanism, in which delegation relationships are directly verified by asking the delegator. By dynamically discovering potential credential chains a trust community is maintained. Existed credential chain discovery methods are not scalable enough for that they either need collecting all credentials in the system or need referring to all the potential users. In our approach, each user keeps a trust list to reduce the fan-out of searching steps. The simulation shows that the performance is greatly improved.