An Authentication and Authorization Protocol Using Ticket in Pervasive Environment.
Jong Sik MoonIm-Yeong LeeKang Bin YimSang-Gu ByeonPublished in: AINA Workshops (2010)
Keyphrases
- trust negotiation
- pervasive environments
- authentication protocol
- security analysis
- security requirements
- pervasive computing
- access control
- mutual authentication
- key distribution
- security protocols
- security policies
- automated trust negotiation
- trust management
- service discovery
- public key
- access control policies
- service providers
- mobile devices
- smart card
- trusted third party
- key agreement protocol
- virtual private network
- lightweight
- trust relationships
- data management
- databases
- key management
- database
- secret key
- ambient intelligence
- data mining