Confidence value based multi levels of authentication for ubiquitous computing environment

He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. However, the deployment of this computing paradigm in real-life is hindered by the lack of proper authentication and access control techniques. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blend nicely into ubiquitous computing environments.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages954-963
Number of pages10
Volume3981 LNCS
DOIs
Publication statusPublished - 2006 Jul 19
Externally publishedYes
EventICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom
Duration: 2006 May 82006 May 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3981 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherICCSA 2006: International Conference on Computational Science and Its Applications
CountryUnited Kingdom
CityGlasgow
Period06/5/806/5/11

Fingerprint

Ubiquitous Computing
Ubiquitous computing
Authentication
Confidence
Paradigm
Computing
Access Control
Access control
Sufficient

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Zheng, H., Kwak, J., Son, K., Lee, W., Kim, S-J., & Won, D. (2006). Confidence value based multi levels of authentication for ubiquitous computing environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3981 LNCS, pp. 954-963). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3981 LNCS). https://doi.org/10.1007/11751588_99

Confidence value based multi levels of authentication for ubiquitous computing environment. / Zheng, He; Kwak, Jin; Son, Kyungho; Lee, Wansuk; Kim, Seung-Joo; Won, Dongho.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3981 LNCS 2006. p. 954-963 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3981 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zheng, H, Kwak, J, Son, K, Lee, W, Kim, S-J & Won, D 2006, Confidence value based multi levels of authentication for ubiquitous computing environment. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3981 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3981 LNCS, pp. 954-963, ICCSA 2006: International Conference on Computational Science and Its Applications, Glasgow, United Kingdom, 06/5/8. https://doi.org/10.1007/11751588_99
Zheng H, Kwak J, Son K, Lee W, Kim S-J, Won D. Confidence value based multi levels of authentication for ubiquitous computing environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3981 LNCS. 2006. p. 954-963. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11751588_99
Zheng, He ; Kwak, Jin ; Son, Kyungho ; Lee, Wansuk ; Kim, Seung-Joo ; Won, Dongho. / Confidence value based multi levels of authentication for ubiquitous computing environment. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3981 LNCS 2006. pp. 954-963 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{6cf6013b2c8a4f168b03f1821a9dcbaa,
title = "Confidence value based multi levels of authentication for ubiquitous computing environment",
abstract = "New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. However, the deployment of this computing paradigm in real-life is hindered by the lack of proper authentication and access control techniques. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blend nicely into ubiquitous computing environments.",
author = "He Zheng and Jin Kwak and Kyungho Son and Wansuk Lee and Seung-Joo Kim and Dongho Won",
year = "2006",
month = "7",
day = "19",
doi = "10.1007/11751588_99",
language = "English",
isbn = "3540340726",
volume = "3981 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "954--963",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Confidence value based multi levels of authentication for ubiquitous computing environment

AU - Zheng, He

AU - Kwak, Jin

AU - Son, Kyungho

AU - Lee, Wansuk

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2006/7/19

Y1 - 2006/7/19

N2 - New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. However, the deployment of this computing paradigm in real-life is hindered by the lack of proper authentication and access control techniques. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blend nicely into ubiquitous computing environments.

AB - New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. However, the deployment of this computing paradigm in real-life is hindered by the lack of proper authentication and access control techniques. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blend nicely into ubiquitous computing environments.

UR - http://www.scopus.com/inward/record.url?scp=33745926514&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745926514&partnerID=8YFLogxK

U2 - 10.1007/11751588_99

DO - 10.1007/11751588_99

M3 - Conference contribution

SN - 3540340726

SN - 9783540340720

VL - 3981 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 954

EP - 963

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -