Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
A system, which uses context information is a new trend in IT. A lot of researchers create frameworks, which collect some data and perform actions based on them. Recently, there have been observed more and more different security solutions, in which we can use context. But not each works dynamically and ensures a high level of user's quality of experience (QoE). This paper outlines what the context information is and shows a secure and user-friendly authentication mechanism for a mail box in cloud computing, based on using contextual data.
Wydawca
Rocznik
Tom
Strony
31--45
Opis fizyczny
Bibliogr. 32 poz., rys., tab.
Twórcy
autor
- Institute of Telecommunications, Warsaw University of Technology, ul. Nowowiejska 15/19, 00-665 Warsaw, Poland
Bibliografia
- [1] Aboba B., Blunk L., Vollbrecht J., Carlson J., Levkowetz H., Extensible Authentication Protocol (EAP), RFC 3748 (2004).
- [2] Andress J., Identification and Authentication, The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice (2011).
- [3] Anderson R. J., Security Engineering: A Guide to Building Dependable Distributed Systems (2008).
- [4] Allen R., Hunter L. E., Dinerman B. J., Routing and Remote Access Service (Remote Access) (2006): 14-189.
- [5] Fajardo V., Arkko J., Loughney J., Zorn G., Diameter Base Protocol, RFC 6733 (2012).
- [6] Fitzek F., Munari M., Pastesini V., Rossi S., Badia L., Security and authenticationconcepts for UMTS/WLAN convergence (2003).
- [7] Flordi L., Information: A Very Short Introduction, UK, Oxford (2010).
- [8] Franks J., Hallam-Baker P., Hostetler J., Lawrence S., Leach P., HTTP Authentication: Basic and Digest Access Authentication, RFC 2617 (1999).
- [9] Gwizdka J., Whats in the Context?, Toronto, Canada (2000).
- [10] Kotulski Z., Sepczuk M., Sitek A., Tunia M.A., Adaptable context management framework for secure network services (to appear) (2014).
- [11] Lloyd B., Simpson W., PPP Authentication Protocols, RFC 1334 (1992).
- [12] Neuman C., Yu T., Hartman S., Raeburn K., The Kerberos Network Authentication Service (V5), USA (2005).
- [13] OWL - Web Ontology Language, http://www.w3.org/TR/owl-features
- [14] Rigney C., Rubens A., Simpson W., Willens S., Remote Authentication Dial In User Service (RADIUS) (1997).
- [15] Rojas R., Neural Networks, Tokyo, Japan (1996).
- [16] Rokach L., Maimon O., Data Mining with Decision Trees: Theory and Applications (2014).
- [17] Schilit B. N., Adams N., Want R., Context-Aware Computing Applications (1994).
- [18] Simpson W., PPP Challenge Handshake Authentication Protocol (CHAP), RFC 1994, Day-Dreamer (1996).
- [19] Tsay J., Mjolsnes S. F., A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols (2012).
- [20] Vogt H., Exploring Message Authentication in sensor networks, ETH Zurich (2005).
- [21] Winograd T., A Human-Centered Interaction Architecture, http://graphics.stanford.edu/projects/iwork/old/papers/humcent/ (1999).
- [22] Wrona K., Gomez L., Context-aware security and secure context-awareness inubiquitous computing environments, France (2005).
- [23] Zorn G., Cobb S., Microsoft PPP CHAP Extensions, RFC 2433, Microsoft Corporation (1998).
- [24] Zorn G., Microsoft PPP CHAP Extensions, Version 2, RFC 2759, Microsoft Corporation (2000).
- [25] Goel D., Kher E., Joag S., Mujumdar V., Griss M., Dey A. K., Context-Aware Authentication Framework, San Diego, CA, USA (2009): 26-29.
- [26] Lenzini G., Trust-Based and Context-Aware Authentication in a Software Architecture for Context and Proximity-Aware Services, The Netherlands (2009).
- [27] Hulsebosch R.J., Bargh M.S., Lenzini G., Ebben P.W.G., Iacob S.M., Context Sensitive Adaptive Authentication, Kendal, England (2007): 23-25.
- [28] Park S., Han Y., Chung T., Context-Aware Security Management System for Pervasive Computing Environment, Roskilde, Denmark (2007): 2-24.
- [29] Miranda L. H. F. M., Context-aware multi-factor authentication, Lisbona, Portugal (2009).
- [30] Nishiki K., Tanaka E., Authentication and Access Control Agent Framework for Context-Aware Services, Trento, Italy.
- [31] Rocha C.C., Lima J.C.D., Dantas M.A.R., A2BeST: An adaptive authentication service based on mobile user's behavior and spatio-temporal context, Brazil (2011).
- [32] Hayashi E., Das S., Amini S., Hong J., Oakley I., CASA: Context- Aware Scalable Authentication, Newcastle, UK (2013): 24-26.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-2a65f4b2-98a1-4fb5-bbff-0bf39377aece