Vigil / Secure Centaurus
Status: Past project
Vigil / Secure Centaurus is an ongoing research project on smart home / smart office scenario.
The goal of the project is to demonstrate a smart office environment where mobile user can use her handheld device to ad-hocly operate over all resources/services embedded in the environment. These services include doors, lights, music, powerpoint presentations, printers and various information services. A user can access these services through Bluetooth, Wi-Fi and IR enabled handheld devices as well as using a voice command.
Additionally, the goal of the project is to use distributed trust management to provide a solution to security and trust problems in mobile pervasive environments. The current mobile ad-hoc environments provide a limited amount of security in terms of encryption and authentication, usually as part of the particular wireless technology. These solutions do not address the important issue of trust, which is required to enable secure interaction among various devices in ad-hoc environments. We have designed Vigil, which uses existing security methods along with distributed trust, to enable authentication and access control in pervasive environments. Vigil complements SPKI and Role Based Access Control with trust management. Every space, whether it is a room, a part of a room, building etc. is managed by an environment controller. The controller enforces a security policy which consists of rules for authenticating users and assigning domain-specific roles. Every resource in the space registers with the controller and trusts the controller to manage its access control. When a user enters the space, she/he registers with the controller using her/his certificates. These certificates are validated by the controller using certain rules. Based on her/his credentials, the user is assigned a set of roles and is given access rights associated with those roles. These are basic role based access rights. Access rights of users are dynamic and can be changed by delegations and revocations without affecting the roles of the user.
Start Date: January 2000
End Date: May 2004
There are 8 associated publications: Hide the list...
6 Refereed Publications
1. Harry Chen et al., "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 4553 downloads.
2. Harry Chen et al., "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 4681 downloads.
3. Lalana Kagal et al., "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4198 downloads.
4. Lalana Kagal et al., "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 1994 downloads.
5. Lalana Kagal et al., "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 4797 downloads.
6. Lalana Kagal et al., "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 4973 downloads.
2 Non-Refereed Publications
1. Lalana Kagal et al., "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 4536 downloads.
2. Andrej Cedilnik et al., "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 3725 downloads.
There are 0 associated resources: Hide the list...