Download Now Free registration required
In a distributed computing environment, remote devices must often be granted access to sensitive information. In such settings, it is desirable to restrict access only to known, trusted devices. While approaches based on public key infrastructure and trusted hardware can be used in many cases, there are settings for which these solutions are not practical. In this paper, the authors define physically restricted access control to reflect the practice of binding access to devices based on their intrinsic properties. Their approach is based on the application of physically unclonable functions.
- Format: PDF
- Size: 683.41 KB