This file was created by the TYPO3 extension bib --- Timezone: CEST Creation date: 2024-05-05 Creation time: 14-26-13 --- Number of references 3 inproceedings 201003GarciaEffContAwareAccControlPMS Efficient and Context-Aware Access Control for Pervasive Medical Sensor Networks 2010 Proceedings of the First IEEE PerCom Workshop on Pervasive Healthcare OscarGarcia-Morchon KlausWehrle inproceedings 201006GarciaIFIPTM On Applications of Cooperative Security in Distributed Networks 2010 ManyapplicationsrunningontheInternetoperateinfullyor semi-distributed fashion including P2P networks or social networks. Dis- tributed applications exhibit many advantages over classical client-server models regarding scalability, fault tolerance, and cost. Unfortunately, the distributed system operation also brings many security threats along that challenge their performance and reliability. In particular, faulty or mis- behaving nodes cannot collude to subvert the system operation. This paper addresses the above threats by applying cooperative security techniques to relevant distributed systems in the Internet. Our goal is to present methods that allow the peers to bootstrap basic trust relation- ships at the time of joining a distributed network and remove the peers if trust is lost. We consider the specific security caveats of the analyzed sys- tems, investigate the applicability of existing cooperative security-based protocols, and propose general design guidelines for cooperative-security protocol in described distributed systems. Print Springer
Berlin
Proceedings of IFIPTM 2010 - 4th International Conference on Trust Management Morioka, Japan 4th International Conference on Trust Management en 978-3-642-13445-6 1 DmitriyKuptsov OscarGarcia-Morchon KlausWehrle AndreiGurtov
inproceedings 201006GarciaSacmat Modular Context-Aware Access Control for Medical Sensor Network 2010 Medical sensor networks allow for pervasive health monitoring of users in hospitals, at home, or on the way. The privacy and confidentiality of medical data need to be guaranteed at any moment to make sure that unauthorized parties cannot retrieve confidential information. This is a great challenge due to two main reasons. First, wireless sensors are resource-constrained devices that limit the applicability of traditional solutions. Second, the access control system must be context-aware and adapt its security settings to ensure the users' safety during, e.g., medical emergencies. To solve these issues, this paper presents a modular context-aware access control system tailored to pervasive medical sensor networks in which the access control decisions and the response delay depend upon the health acuteness of a user. Our system extends traditional role-based access control systems by allowing for context-awareness in critical, emergency, and normal access control situations. We further present a lightweight encoding for our modular access control policies as well as an access control engine efficiently running on resource-constrained sensor nodes. Finally, we analyze how the proposed access control system suits existing security architectures for medical sensor networks.
Pittsburgh, USA
Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT'10) ACM 978-1-4503-0049-0 10.1145/1809842.1809864 1 OscarGarcia-Morchon KlausWehrle