Perform Authentication

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 255 Experts worldwide ranked by ideXlab platform

Mounir Mokhtari - One of the best experts on this subject based on the ideXlab platform.

  • A flexible privacy and trust based context-aware secure framework
    2010
    Co-Authors: Pierre E. Abi-char, Bachar El-hassan, Abdallah M'hamed, Mounir Mokhtari
    Abstract:

    Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to Perform Authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.)

  • A dynamic trust based context -aware Authentication framework with privacy preserving
    International Journal of Computer and Network Security (IJCNS), 2010
    Co-Authors: Abdallah M'hamed, Pierre E. Abi-char, Bachar El-hassan, Mounir Mokhtari
    Abstract:

    As ubiquitous technologies ingrain themselves further into our lives, rapid progress has been made in context-aware computing. Context-aware environments are set to become a reality. However, major challenges remain to be addressed including privacy, Authentication, access control, and trust. These security challenges have to be non-intrusive, intelligent, and able to adapt to the rapidly changing contexts of users. Context-aware environments are expected to make these challenges more accurate and to consider them in place from the start, so that a mutual trust relationship can be formed between entities. It is therefore, a key challenge in a ubiquitous network society to design an effective privacy preserving Authentication and access control framework that adequately meet security requirements posed by the context-aware service paradigm in pervasive computing environment. In this paper, we propose a security framework that integrates context-awareness to Perform Authentication and access control approach in a very flexible and scalable model that is both context-aware and privacy preserving. Moreover, we show how our framework can be integrated with trust management. In this paper, we focus on introducing an anonymous Authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The architecture focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).

  • ICOST - A flexible privacy and trust based context-aware secure framework
    Lecture Notes in Computer Science, 2010
    Co-Authors: Pierre E. Abi-char, A. Mhamed, Bachar El-hassan, Mounir Mokhtari
    Abstract:

    Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to Perform Authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).

Pierre E. Abi-char - One of the best experts on this subject based on the ideXlab platform.

  • A flexible privacy and trust based context-aware secure framework
    2010
    Co-Authors: Pierre E. Abi-char, Bachar El-hassan, Abdallah M'hamed, Mounir Mokhtari
    Abstract:

    Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to Perform Authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.)

  • A dynamic trust based context -aware Authentication framework with privacy preserving
    International Journal of Computer and Network Security (IJCNS), 2010
    Co-Authors: Abdallah M'hamed, Pierre E. Abi-char, Bachar El-hassan, Mounir Mokhtari
    Abstract:

    As ubiquitous technologies ingrain themselves further into our lives, rapid progress has been made in context-aware computing. Context-aware environments are set to become a reality. However, major challenges remain to be addressed including privacy, Authentication, access control, and trust. These security challenges have to be non-intrusive, intelligent, and able to adapt to the rapidly changing contexts of users. Context-aware environments are expected to make these challenges more accurate and to consider them in place from the start, so that a mutual trust relationship can be formed between entities. It is therefore, a key challenge in a ubiquitous network society to design an effective privacy preserving Authentication and access control framework that adequately meet security requirements posed by the context-aware service paradigm in pervasive computing environment. In this paper, we propose a security framework that integrates context-awareness to Perform Authentication and access control approach in a very flexible and scalable model that is both context-aware and privacy preserving. Moreover, we show how our framework can be integrated with trust management. In this paper, we focus on introducing an anonymous Authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The architecture focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).

  • ICOST - A flexible privacy and trust based context-aware secure framework
    Lecture Notes in Computer Science, 2010
    Co-Authors: Pierre E. Abi-char, A. Mhamed, Bachar El-hassan, Mounir Mokhtari
    Abstract:

    Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to Perform Authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).

Bachar El-hassan - One of the best experts on this subject based on the ideXlab platform.

  • A flexible privacy and trust based context-aware secure framework
    2010
    Co-Authors: Pierre E. Abi-char, Bachar El-hassan, Abdallah M'hamed, Mounir Mokhtari
    Abstract:

    Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to Perform Authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.)

  • A dynamic trust based context -aware Authentication framework with privacy preserving
    International Journal of Computer and Network Security (IJCNS), 2010
    Co-Authors: Abdallah M'hamed, Pierre E. Abi-char, Bachar El-hassan, Mounir Mokhtari
    Abstract:

    As ubiquitous technologies ingrain themselves further into our lives, rapid progress has been made in context-aware computing. Context-aware environments are set to become a reality. However, major challenges remain to be addressed including privacy, Authentication, access control, and trust. These security challenges have to be non-intrusive, intelligent, and able to adapt to the rapidly changing contexts of users. Context-aware environments are expected to make these challenges more accurate and to consider them in place from the start, so that a mutual trust relationship can be formed between entities. It is therefore, a key challenge in a ubiquitous network society to design an effective privacy preserving Authentication and access control framework that adequately meet security requirements posed by the context-aware service paradigm in pervasive computing environment. In this paper, we propose a security framework that integrates context-awareness to Perform Authentication and access control approach in a very flexible and scalable model that is both context-aware and privacy preserving. Moreover, we show how our framework can be integrated with trust management. In this paper, we focus on introducing an anonymous Authentication and access control scheme to secure interactions between users and services in ubiquitous environments. The architecture focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).

  • ICOST - A flexible privacy and trust based context-aware secure framework
    Lecture Notes in Computer Science, 2010
    Co-Authors: Pierre E. Abi-char, A. Mhamed, Bachar El-hassan, Mounir Mokhtari
    Abstract:

    Ubiquitous and pervasive technologies contribute significantly to the quality of life of dependent people by providing personalized services in context aware environments. The deployment of these services within indoor and outdoor environments still require security, privacy and trust issues for dependent persons. Considering the strong links between these three issues, our challenging task was to integrate them in a common and flexible framework using contextual information. In this paper, we propose a security framework that integrates context awareness to Perform Authentication and access control in a very flexible and scalable model while ensuring both privacy and trust. The framework focuses on the Authentication of users who request access to the resources of smart environment system through static devices (i.e. smart card, RFID, etc.), or dynamic devices (i.e. PDA, mobile phones, etc.).

Abdelmadjid Bouabdallah - One of the best experts on this subject based on the ideXlab platform.

  • Reliable and fully distributed trust model for mobile ad hoc networks
    Computers & Security, 2009
    Co-Authors: Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
    Abstract:

    International audienceA mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a widespread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc networks. In this paper, we propose a fully distributed public key certificate management system based on trust graphs and threshold cryptography. It permits users to issue public key certificates, and to Perform Authentication via certificates' chains without any centralized management or trusted authorities. Moreover, thanks to the use of threshold cryptography; our system resists against false public keys certification. We Perform an overall evaluation of our proposed approach through simulations. The results indicate out Performance of our approach while providing effective security

  • Fully Distributed Trust Model based on Trust Graph for Mobile Ad hoc Networks
    2008
    Co-Authors: Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah
    Abstract:

    A mobile ad hoc network (MANET) is a wireless communication network which does not rely on a pre-existing infrastructure or any centralized management. Securing the exchanges in MANETs is compulsory to guarantee a wide spread development of services for this kind of networks. The deployment of any security policy requires the definition of a trust model that defines who trusts who and how. Our work aims to provide a fully distributed trust model for mobile ad hoc networks. In this paper, we propose a fully distributed public key certificate management system based on trust graphs and threshold cryptography. It permits users to issue public key certificates, and to Perform Authentication via certificates’ chains without any centralized management or trusted authorities. Moreover, thanks to the use of threshold cryptography; our system resists against false public keys certification. We Perform an overall evaluation of our proposed approach through simulations. The results indicate out Performance of our approach while providing eective security.

Jean-pierre Hubaux - One of the best experts on this subject based on the ideXlab platform.

  • Self-organized public-key management for mobile ad hoc networks
    IEEE Transactions on Mobile Computing, 2003
    Co-Authors: Srdjan Capkun, Levente Buttyán, Jean-pierre Hubaux
    Abstract:

    In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to Perform Authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.