Infrastructure of Authentication and Authorization for Mobile Users Using Pervasive- PKI

Main Article Content

Ms. Poonam. A. Manjare
Prof. R. R Keole

Abstract

In computer science distributed systems could be more secured with a distributed trust model based on PKI. PKI provides a framework
to verify the identities of each entities of given domain. However, it becomes difficult to establish trust relationship across heterogeneous
domains due to different actual trust mechanism and security policy as well as the intrinsic flaw of each trust model. Network and device
heterogeneity, nomadic mobility, intermittent connectivity and, more generally, extremely dynamic operating conditions, are major challenges in
the design of security infrastructures for pervasive computing. Yet, in a ubiquitous computing environment, limitations of traditional solutions
for authentication and authorization can be overcome with a pervasive public key infrastructure (pervasive-PKI).

Keywords: Authentication, Authorization, Security Architecture, Trust, Ubiquitous Computing

Downloads

Download data is not yet available.

Article Details

Section
Articles