{"title":"UCSSDAP:普适计算服务安全委托授权协议","authors":"Daoqing Sun","doi":"10.1109/ICAL.2011.6024745","DOIUrl":null,"url":null,"abstract":"In order to enjoy the service supply automatically and transparently in ubiquitous environments, it is necessary to delegation the service to the other principal. In this paper, a new ubiquitous computing service security delegation authorization protocol, named UCSSDAP, is presented. It is based on the SPKI service authorization certificate. The security analysis by using the BAN logic shows that UCSSDAP is a security protocol. And the performance analysis shows that UCSSDAP is a suitable security solution used in ubiquitous computing environment.","PeriodicalId":351518,"journal":{"name":"2011 IEEE International Conference on Automation and Logistics (ICAL)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"UCSSDAP: Ubiquitous computing service security delegation authorization protocol\",\"authors\":\"Daoqing Sun\",\"doi\":\"10.1109/ICAL.2011.6024745\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to enjoy the service supply automatically and transparently in ubiquitous environments, it is necessary to delegation the service to the other principal. In this paper, a new ubiquitous computing service security delegation authorization protocol, named UCSSDAP, is presented. It is based on the SPKI service authorization certificate. The security analysis by using the BAN logic shows that UCSSDAP is a security protocol. And the performance analysis shows that UCSSDAP is a suitable security solution used in ubiquitous computing environment.\",\"PeriodicalId\":351518,\"journal\":{\"name\":\"2011 IEEE International Conference on Automation and Logistics (ICAL)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE International Conference on Automation and Logistics (ICAL)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAL.2011.6024745\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Automation and Logistics (ICAL)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAL.2011.6024745","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
UCSSDAP: Ubiquitous computing service security delegation authorization protocol
In order to enjoy the service supply automatically and transparently in ubiquitous environments, it is necessary to delegation the service to the other principal. In this paper, a new ubiquitous computing service security delegation authorization protocol, named UCSSDAP, is presented. It is based on the SPKI service authorization certificate. The security analysis by using the BAN logic shows that UCSSDAP is a security protocol. And the performance analysis shows that UCSSDAP is a suitable security solution used in ubiquitous computing environment.