|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
Talking to strangers
If you have a question about this talk, please contact Andrew Lewis.
Access Control is conventionally built on top of authentication. This approach is problematic when several different security policy domains are involved. Authenticating across domain boundaries requires contending with different policies (and mechanisms) for identity management, delegation and revocation of authorization, etc. Additional issues in pervasive computing include the lack of transitive infrastructure and the promiscuity of casual device interactions.
This talk will describe an approach to localizing the trust assumptions required for multi-domain access control in a pervasive environment. We place dual capabilities inside Identity-Based Encryption wrappers to force the authentication problems back inside each player’s ‘home’ domain.
Security problems which arise from talking to the wrong strangers are usually addressed by attempting to ensure that we know to whom we are speaking. We argue that often it is preferable to know that we are talking to the correct stranger.
This talk is part of the Computer Laboratory Security Seminar series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsSpring School 2009 - "Regeneration and Plasticity of Neural Circuits" Global Student Education Forum (GSEF) Winton Programme for the Physics of Sustainability
Other talksThe 5th Annual Sir John Walker Lecture, "The molecular calcium reporter: molecular identity and physiological role" Disease Migration How to Get the Most Out of Modern Peer Review 電車の中の居眠り― 車内空間とジェンダーを考察する ― カバンもちから鞄持へ − マイ落語ライフ一席 Influence and the role of the expert