An user-centric attribute based access control model for ubuquitous environments

4Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The recent developments in mobile platforms are significant, both on the hardware and software fronts. With the huge success of the iPhone and Android phones, more and more companies are entering the mobile application market. However, there are increasing security threats for mobile phone users due to the new generation of attacks targeted purely on mobile environments. Several solutions have been proposed to date, which can generally handle consent in a fixed and coarse-grained way. However, with the increasing usage of mobile devices for high value transactions, the future access control from mobile devices should be based on 'user-centric' challenge response techniques based on the freatures of mobile platforms.The authors present the MLive© framework, a novel approach to establish mutual authentication between the users and the service providers using unique mobile based attirbutes to solve the threats in the mobile environments. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.

Cite

CITATION STYLE

APA

Li, F., Weerasinghe, D., Patel, D., & Rajarajan, M. (2012). An user-centric attribute based access control model for ubuquitous environments. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 95 LNICST, pp. 361–367). https://doi.org/10.1007/978-3-642-32320-1_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free