About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks

Research Article

On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/SECURECOMM.2005.28,
        author={ Danfeng  Yao and R. Tamassia and  S.  Proctor},
        title={On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing},
        proceedings={1st International ICST Conference on Security and Privacy for Emerging Areas in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2006},
        month={3},
        keywords={},
        doi={10.1109/SECURECOMM.2005.28}
    }
    
  • Danfeng Yao
    R. Tamassia
    S. Proctor
    Year: 2006
    On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing
    SECURECOMM
    IEEE
    DOI: 10.1109/SECURECOMM.2005.28
Danfeng Yao1, R. Tamassia1, S. Proctor1
  • 1: Brown University

Abstract

In ubiquitous computing environments, computing devices may have small storage units and limited bandwidths. A trust management system needs to be efficient in order to keep communication and computation costs low. The trust establishment mechanism needs to be flexible, because credentials are usually scattered at distributed locations. Also, the authorization process needs to be decentralized and support dynamic resource-sharing in order to handle emergency situations. We discuss how to improve the efficiency, flexibility, and privacy of role-based cascaded delegations in a ubiquitous computing environment. Operations for managing delegation chains in the role-based cascaded delegation (RBCD) model are presented. These operations can significantly improve the performance of the decentralized delegation in the RBCD model, without increasing the management overhead.

Published
2006-03-20
Publisher
IEEE
http://dx.doi.org/10.1109/SECURECOMM.2005.28
Copyright © 2005–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL