Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using Kerberos.
Jasone AstorgaJon MatíasPurificación SáizEduardo JacobPublished in: SEWCN (2009)
Keyphrases
- resource limited
- ubiquitous environments
- access control
- embedded systems
- security requirements
- security policies
- smart home
- security analysis
- authentication protocol
- role based access control
- information security
- access requests
- public key cryptosystem
- power management
- authentication mechanism
- network security
- data security
- smart card
- trust negotiation
- security mechanisms
- access control mechanism
- low cost
- trust management
- mutual authentication
- mobile devices
- multi domain
- security issues
- intrusion detection
- computer vision
- secret key
- rfid tags
- key distribution
- key management