A Design of Authentication and Access Control Model for Remote Access Using GSM Technologies

The GSM technologies plays vital role in pervasive computing environments. The open and dynamic nature of the pervasive computing environment allows entities to join and leave frequently. This causes a large number of autonomous entities to interact in an ad-hoc manner, raising concerns as to the trustworthiness of the service providers. Thus service providers are not willing to share their resources to the anonymous users for fear of a potential security violation. To handle the issue of anonymous resource access, a policy based trust management system must grant user access of resources and information based on trustworthiness rather than the conventional technique map access rights authorization.

Provided by: International Journal of Computer Applications Topic: Mobility Date Added: Nov 2012 Format: PDF

Find By Topic