Authentication and authorisation for the personal distributed environment

T. McKay, J. Irvine

Research output: Contribution to conferencePaper

Abstract

The interconnection of mobile and fixed devices is likely to develop into the concept of a seamless, user centric 'Personal Distributed Environment'. Such networks must be open and dynamic, but must also be secure, and take into account limitations on device resources. Drawing on the characteristics of existing protocols, a secure implementation for a PDE is given. The key stage of authentication and authorisation is addressed, with efficient and robust exchanges defined

LanguageEnglish
Pages174-178
Number of pages4
DOIs
Publication statusPublished - 2007
EventIEEE 65th Vehicular Technology Conference - Dublin, Ireland
Duration: 22 Apr 200725 Apr 2007

Conference

ConferenceIEEE 65th Vehicular Technology Conference
Abbreviated titleVTC2007-Spring
CountryIreland
CityDublin
Period22/04/0725/04/07

Fingerprint

Authentication

Keywords

  • access control
  • signal processing
  • robustness
  • protection
  • information security
  • data security
  • cryptography
  • authorization
  • authentication
  • access protocols

Cite this

McKay, T., & Irvine, J. (2007). Authentication and authorisation for the personal distributed environment. 174-178 . Paper presented at IEEE 65th Vehicular Technology Conference , Dublin, Ireland. https://doi.org/10.1109/VETECS.2007.48
McKay, T. ; Irvine, J. / Authentication and authorisation for the personal distributed environment. Paper presented at IEEE 65th Vehicular Technology Conference , Dublin, Ireland.4 p.
@conference{24ee9ea289be4f30bf2765724b061375,
title = "Authentication and authorisation for the personal distributed environment",
abstract = "The interconnection of mobile and fixed devices is likely to develop into the concept of a seamless, user centric 'Personal Distributed Environment'. Such networks must be open and dynamic, but must also be secure, and take into account limitations on device resources. Drawing on the characteristics of existing protocols, a secure implementation for a PDE is given. The key stage of authentication and authorisation is addressed, with efficient and robust exchanges defined",
keywords = "access control, signal processing , robustness , protection , information security , data security , cryptography , authorization , authentication , access protocols",
author = "T. McKay and J. Irvine",
year = "2007",
doi = "10.1109/VETECS.2007.48",
language = "English",
pages = "174--178",
note = "IEEE 65th Vehicular Technology Conference , VTC2007-Spring ; Conference date: 22-04-2007 Through 25-04-2007",

}

McKay, T & Irvine, J 2007, 'Authentication and authorisation for the personal distributed environment' Paper presented at IEEE 65th Vehicular Technology Conference , Dublin, Ireland, 22/04/07 - 25/04/07, pp. 174-178 . https://doi.org/10.1109/VETECS.2007.48

Authentication and authorisation for the personal distributed environment. / McKay, T.; Irvine, J.

2007. 174-178 Paper presented at IEEE 65th Vehicular Technology Conference , Dublin, Ireland.

Research output: Contribution to conferencePaper

TY - CONF

T1 - Authentication and authorisation for the personal distributed environment

AU - McKay, T.

AU - Irvine, J.

PY - 2007

Y1 - 2007

N2 - The interconnection of mobile and fixed devices is likely to develop into the concept of a seamless, user centric 'Personal Distributed Environment'. Such networks must be open and dynamic, but must also be secure, and take into account limitations on device resources. Drawing on the characteristics of existing protocols, a secure implementation for a PDE is given. The key stage of authentication and authorisation is addressed, with efficient and robust exchanges defined

AB - The interconnection of mobile and fixed devices is likely to develop into the concept of a seamless, user centric 'Personal Distributed Environment'. Such networks must be open and dynamic, but must also be secure, and take into account limitations on device resources. Drawing on the characteristics of existing protocols, a secure implementation for a PDE is given. The key stage of authentication and authorisation is addressed, with efficient and robust exchanges defined

KW - access control

KW - signal processing

KW - robustness

KW - protection

KW - information security

KW - data security

KW - cryptography

KW - authorization

KW - authentication

KW - access protocols

U2 - 10.1109/VETECS.2007.48

DO - 10.1109/VETECS.2007.48

M3 - Paper

SP - 174

EP - 178

ER -

McKay T, Irvine J. Authentication and authorisation for the personal distributed environment. 2007. Paper presented at IEEE 65th Vehicular Technology Conference , Dublin, Ireland. https://doi.org/10.1109/VETECS.2007.48