Ubiquitous networks and seamless terminals are potential enablers for session mobility and session transfer. In a business environment, session mobility is restricted by the security requirements set forth by corporate security policies to protect corporate assets. Session mobility can be supported to the extent that specified corporate assets are still protected even though a session is transferred to another mobile device. We describe a policy-driven approach for secure session transfers. Secure session transfer mechanisms validate whether or not a session transfer is allowed, establish secure interaction channels with target devices, perform security context negotiation and, if all previous steps are successful, facilitate transferring a session from a source to a target device. The protocol is supported by security policies and digitally signed assertion tokens. Policies define the constraints to be met before (i.e. decision whether transfer is possible or not) and after session transfer (i.e. respective security context.), while tokens are utilized to identify suitable mobile devices that claim trustworthiness, which may be target of a session transfer. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Robinson, P., Schaefer, C., & Walter, T. (2005). POSSET - Policy-driven secure session transfer. In Lecture Notes in Computer Science (Vol. 3439, pp. 13–24). Springer Verlag. https://doi.org/10.1007/978-3-540-31979-5_2
Mendeley helps you to discover research relevant for your work.