@InProceedings{RCBDR03, author = { Sanjay Raman and Dwaine Clarke and Matt Burnside and Srinivas Devadas and Ronald [L.] Rivest }, title = { Access-Controlled Resource Discovery for Pervasive Networks }, pages = { 338--345 }, OPTurl = { http://doi.acm.org/10.1145/952532.952600 }, doi = { 10.1145/952532.952600 }, acmid = { 952600 }, acm = { 783153 }, booktitle = { Proceedings of the 2003 Symposium on Applied Computing }, date = { 2003 }, editor = { Hisham Haddad and George Papadopoulos }, publisher = { ACM }, isbn = { 1-58113-624-2 }, OPTyear = { 2003 }, OPTmonth = { March 9--12, }, eventdate = { 2003-03-09/2003-03-12 }, eventtitle = { SAC '03 }, venue = { Melbourne, Florida }, urla = { SAC'03 }, OPTannote = { Extended version in Conncurrency and Computation: Practice and Experience }, keywords = { authorization, certificate, mobile device, pervasive, protocol, proxy, security, ubiquitous }, abstract = { Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Becuase of the dynamic nature of these networks, resource discovery is one of the fundamental problems that must be faced. While resource discovery systems are not a novel concept, securing these systems in an efficient and scalable way is challenging. This paper describes the design and implementation of an architecture for access-controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system. The integration is also scalable, efficient, and fits well within a proxy-based security framework designed for dynamic networks. We provide performance experiments that show how our solutions outperforms existing schemes. The result is a system that provides secure, access-controlled resource discovery that can scale to large numbers of resources and users. }, }