Abstract
In this paper, we propose a simple access protocol to shared information in a mobile environment. The objective of the proposed scheme is to allow a specified set of users access toshared information and protect the confidentiality of the information from users outside this set. The set of users may be updated from time to time. In particular, the duration during which a user is allowed access to the shared information may be restricted. Furthermore, the information itself has limited lifetime and the confidentiality of the information has to be preserved during this lifetime only. The proposed access protocol is in particular suited to the mobile environment, because of the loose binding of the communicating entities.
Similar content being viewed by others
References
M.J. Beller, L.F. Chang and Y. Yacobi, Privacy and authentication on a portable communications system, IEEE J. Select. Areas Comm. 11 (1993) 821–829.
A. Choudhury, N. Maxemchuk, S. Paul and H. Schulzrinne, Copyright protection for electronic publishing over computer networks, IEEE Network (May 1995).
J.T. Brassil, S. Low, N.F. Maxemchuk and L. O'Gorman, Electronic marking and identification techniques to discourage document copying,Infocom '94, Toronto, Canada, June 14–16, 1994, pp. 1278–1287.
L. Kleinrock,Queueing Systems: Volume 1: Theory (Wiley, 1975).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Haas, Z.J., Paul, S. Limited-lifetime shared-access in mobile systems. Wireless Netw 1, 139–146 (1995). https://doi.org/10.1007/BF01202537
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF01202537