Confidence value based multi levels of authentication for ubiquitous computing environment

He Zheng, Jin Kwak, Kyungho Son, Wansuk Lee, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

New computing paradigm in ubiquitous computing environments is revolutionizing the way people interact with computers, services and the surrounding physical spaces. However, the deployment of this computing paradigm in real-life is hindered by the lack of proper authentication and access control techniques. In order to provide stronger authentication, MIST proposed an authentication framework for ubiquitous computing environments and assigned confidence values to some authentication methods to facility the combining. However, the assigned confidence values lack sufficient evidence. In this paper reliable confidence values for each authentication method used in MIST is proposed. These confidence values can combine multiple confidence values in some manner, producing a more accurate net confidence value. Authentication entities with confidence values allows the authentication framework to blend nicely into ubiquitous computing environments.

Original languageEnglish
Title of host publicationComputational Science and Its Applications - ICCSA 2006
Subtitle of host publicationInternational Conference, Proceedings - Part II
PublisherSpringer Verlag
Pages954-963
Number of pages10
ISBN (Print)3540340726, 9783540340720
DOIs
Publication statusPublished - 2006
Externally publishedYes
EventICCSA 2006: International Conference on Computational Science and Its Applications - Glasgow, United Kingdom
Duration: 2006 May 82006 May 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3981 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherICCSA 2006: International Conference on Computational Science and Its Applications
CountryUnited Kingdom
CityGlasgow
Period06/5/806/5/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Confidence value based multi levels of authentication for ubiquitous computing environment'. Together they form a unique fingerprint.

  • Cite this

    Zheng, H., Kwak, J., Son, K., Lee, W., Kim, S., & Won, D. (2006). Confidence value based multi levels of authentication for ubiquitous computing environment. In Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II (pp. 954-963). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3981 LNCS). Springer Verlag. https://doi.org/10.1007/11751588_99