{"title":"RMETC: A reduction method to eSPKI trust certificate","authors":"Daoqing Sun","doi":"10.1109/ICAL.2011.6024744","DOIUrl":null,"url":null,"abstract":"To use the trust certificate is a suitable method for the principal to enjoy the service supply in different ubiquitous environments security. But these trust certificates cannot be used directly in different ubiquitous environments because the lack of ensure directly. Therefore, the suitable reduction method is necessary. In this paper, a new reduction method to eSPKI trust certificate that is based on D-S evidence theory and extended SPKI/SDSI, named RMETC, is presented. The example scenario given in the paper shows us that how to use RMETC to solve the security service supply problem in different ubiquitous computing environments.","PeriodicalId":351518,"journal":{"name":"2011 IEEE International Conference on Automation and Logistics (ICAL)","volume":"204 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Automation and Logistics (ICAL)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAL.2011.6024744","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
To use the trust certificate is a suitable method for the principal to enjoy the service supply in different ubiquitous environments security. But these trust certificates cannot be used directly in different ubiquitous environments because the lack of ensure directly. Therefore, the suitable reduction method is necessary. In this paper, a new reduction method to eSPKI trust certificate that is based on D-S evidence theory and extended SPKI/SDSI, named RMETC, is presented. The example scenario given in the paper shows us that how to use RMETC to solve the security service supply problem in different ubiquitous computing environments.