POSSET - Policy-driven secure session transfer

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Ubiquitous networks and seamless terminals are potential enablers for session mobility and session transfer. In a business environment, session mobility is restricted by the security requirements set forth by corporate security policies to protect corporate assets. Session mobility can be supported to the extent that specified corporate assets are still protected even though a session is transferred to another mobile device. We describe a policy-driven approach for secure session transfers. Secure session transfer mechanisms validate whether or not a session transfer is allowed, establish secure interaction channels with target devices, perform security context negotiation and, if all previous steps are successful, facilitate transferring a session from a source to a target device. The protocol is supported by security policies and digitally signed assertion tokens. Policies define the constraints to be met before (i.e. decision whether transfer is possible or not) and after session transfer (i.e. respective security context.), while tokens are utilized to identify suitable mobile devices that claim trustworthiness, which may be target of a session transfer. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Robinson, P., Schaefer, C., & Walter, T. (2005). POSSET - Policy-driven secure session transfer. In Lecture Notes in Computer Science (Vol. 3439, pp. 13–24). Springer Verlag. https://doi.org/10.1007/978-3-540-31979-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free