An effective access control mechanism in home network environment based on SPKI certificates

Bin Song, In Kwan Yu, Jiseong Son, Doo Kwon Baik

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In home network environment, security is one of the most important issues that need to be addressed because the services provided by all kinds of household appliances are likely related with the privacy information of the residents. Although several access control mechanisms have been proposed in the last few years, these existing models always preserve all the access control policies in the home gateway or the distributed household appliances, and all of them have conspicuous defects. In this paper, we divide access control policies into general policies and privacy policies according to different security requirements of the residents. With the help of SPKI certificates theory, we demonstrate that our model is an effective access control mechanism by providing two types of access control policies with different security schemes.

Original languageEnglish
Title of host publicationProceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
Pages592-595
Number of pages4
DOIs
Publication statusPublished - 2010
Event2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010 - Beijing, China
Duration: 2010 Dec 172010 Dec 19

Publication series

NameProceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010

Other

Other2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
Country/TerritoryChina
CityBeijing
Period10/12/1710/12/19

Keywords

  • Access control policies
  • Home network environment
  • SPKI certificates
  • Security

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'An effective access control mechanism in home network environment based on SPKI certificates'. Together they form a unique fingerprint.

Cite this