TY - GEN
T1 - An effective access control mechanism in home network environment based on SPKI certificates
AU - Song, Bin
AU - Yu, In Kwan
AU - Son, Jiseong
AU - Baik, Doo Kwon
PY - 2010
Y1 - 2010
N2 - In home network environment, security is one of the most important issues that need to be addressed because the services provided by all kinds of household appliances are likely related with the privacy information of the residents. Although several access control mechanisms have been proposed in the last few years, these existing models always preserve all the access control policies in the home gateway or the distributed household appliances, and all of them have conspicuous defects. In this paper, we divide access control policies into general policies and privacy policies according to different security requirements of the residents. With the help of SPKI certificates theory, we demonstrate that our model is an effective access control mechanism by providing two types of access control policies with different security schemes.
AB - In home network environment, security is one of the most important issues that need to be addressed because the services provided by all kinds of household appliances are likely related with the privacy information of the residents. Although several access control mechanisms have been proposed in the last few years, these existing models always preserve all the access control policies in the home gateway or the distributed household appliances, and all of them have conspicuous defects. In this paper, we divide access control policies into general policies and privacy policies according to different security requirements of the residents. With the help of SPKI certificates theory, we demonstrate that our model is an effective access control mechanism by providing two types of access control policies with different security schemes.
KW - Access control policies
KW - Home network environment
KW - SPKI certificates
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=79951641684&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79951641684&partnerID=8YFLogxK
U2 - 10.1109/ICITIS.2010.5689523
DO - 10.1109/ICITIS.2010.5689523
M3 - Conference contribution
AN - SCOPUS:79951641684
SN - 9781424469406
T3 - Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
SP - 592
EP - 595
BT - Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
T2 - 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
Y2 - 17 December 2010 through 19 December 2010
ER -