A Local Broker enabled MobiPass architecture for enhancing trusted interaction efficiency

While mobile computing provides a potentially vast business opportunity for many industry participants, it also raises issues such as security and performance. This paper proposes a Local Broker enabled MobiPass architecture based on our previous research outcomes. Our MobiPass architecture can convert the unpredictable and highly dynamic mobile environment into a trusted business platform. By setting customised rules against a MobiPolicy, the Mobipass architecture enables fine grained access control without necessarily having a prior knowledge or interaction with other encountered parties and environments. This paper extends our MobiPass architecture by introducing an additional element -- the Local Broker, to enhance the architecture's performance and efficiency. A detailed case study has been provided to explain the role that the Local Broker takes in the architecture.

[1]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[2]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[3]  Ravi S. Sandhu,et al.  RBAC on the Web by smart certificates , 1999, RBAC '99.

[4]  Tim Finin,et al.  A Security Architecture Based on Trust Management for Pervasive Computing Systems , 2002 .

[5]  Tharam S. Dillon,et al.  A design methodology for user access control (UAC) middleware , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[6]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[7]  Will Tao,et al.  MobiPass: a passport for mobile business , 2006, Personal and Ubiquitous Computing.

[8]  Will Tao,et al.  Trusted Mobile Interaction via Extended Digital Certificates , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[9]  Kumar Ranganathan,et al.  Trustworthy pervasive computing: the hard security problems , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.