Abstract
Since one of the services that delegation offers is a more optimised distribution paradigm, recontigurable terminals are envisaged to be able to show how security can negotiate and adapt itself in a flexible way, in favour of performance, without nevertheless compromising fundamental security requirements. So far we observe that protocols that enable cascade delegation and maintain end-to-end accountability among all the involved actors, demonstrate heavy computations or increased network usage and unnecessary redundant complexity. With a novel set of delegation algorithms we show that it is possible to maintain end-to-end accountability and at the same time have compact and lightweight cascade characteristics. This has been further enhanced with an innovative security mechanism that can he automatically optimised in various environments. Due to these attributes, the proposed delegation algorithms will additionally enable recontigurable terminals to perform complicated tasks either when they enter an untrusted PAN or they use a slow communications link. These characteristics make our protocols suitable for ubiquitous environments as well as for diverse personalised services and mobile applications.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35691-4_52
Chapter PDF
Similar content being viewed by others
References
M. Abadi, M. Burrows, C. Kaufman, and B. Lampson, “Authentication and delegation with smart-cards”, Science of Computer Programming, 21.91–113, October 1993.
M. Abadi, M. Burrows, B. Lampson and G. Plotkin, “A calculus for Access Control in Distributed Systems”, ACM Transactions on Programming Languages and Systems, Vol. 15, No 4, Pages 706–734, September 1993.
B. Crispo, “Delegation protocols for electronic commerce”, Proceedings of the 6th IEEE Symposium on Computers and Communications, July 2001.
Y. Ding, Patrick Horster, Holger Petersen, “A new approach for delegation using hierarchical delegation tokens”, Proc. 2nd Conference on Computer and Multimedia Security, Chapman and Hall, 1996, S. 128–143.
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, “The digital distributed system security architecture”, Proceedings of the National Computer Security Conference, 1989.
N. Li, B. N. Grosof, and J. Feigenbaum, “Delegation Logic: A logic-based approach to distributed authorization”, ACM Transactions on Information and System Security (TISSEC), in press, February 2003.
Mobile Execution Environment Forum, “MExE specifications”, Available online from http://www.mexeforum.org
K. R. Sollins, “Cascaded authentication”, In Proceedings of the 1988 IEEE Symposium on Security and Privacy, pages 156–163, April 1988.
V. Varadharajan, P. Allen, and S. Black, “An analysis of the proxy problem in distributed systems”, In IEEE Symposium on Security and Privacy, pages 255–277, 1991.
C. Y. Yeun, and T.Farnham, “Secure Software Download for Programmable Mobile User Equipment”, IEE 3G Mobile Communication Technologies Conference, pages 505510, 8–10 May 2002.
C. Y. Yeun, G. Kalogridis, and G. Clemo, “Secure Mobile Delegation for Future Recontïgurable Terminals and Applications”, In Proceedings of the 1st Software Defined Radio Technical Conference, November 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 IFIP International Federation for Information Processing
About this paper
Cite this paper
Kalogridis, G., Yeun, C.Y., Clemo, G. (2003). Flexible Delegation Security for Improved Distribution in Ubiquitous Environments. In: Gritzalis, D., De Capitani di Vimercati, S., Samarati, P., Katsikas, S. (eds) Security and Privacy in the Age of Uncertainty. SEC 2003. IFIP — The International Federation for Information Processing, vol 122. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35691-4_31
Download citation
DOI: https://doi.org/10.1007/978-0-387-35691-4_31
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6489-5
Online ISBN: 978-0-387-35691-4
eBook Packages: Springer Book Archive