A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR

被引:0
|
作者
Tomur, E. [1 ]
Deregozu, R. [1 ]
Genc, T. [1 ]
机构
[1] Banking Regulat & Supervis Agcy, Ankara, Turkey
关键词
Remote access; wireless networks; security; virtual private networks; RBAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [41] PROTECTION ACCESS NETWORK: AN ARCHITECTURE APPROACH TO REMOTE MONITOR AND CONTROL
    Premadi, Aswir
    Ng, Boonchuan
    Mastang
    Ab-Rahman, Mohammad Syuhaimi
    Jumari, Kasmiran
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 1, 2009, : 72 - 75
  • [42] Agent based architecture for secure access from multiple hospitals
    Yoo, Sun K.
    Choe, Jun
    Kim, Do Yoon
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 255 - +
  • [43] Pervasive, Secure Access to a Hierarchical Sensor-Based Healthcare Monitoring Architecture in Wireless Heterogeneous Networks
    Huang, Y. M.
    Hsieh, M. Y.
    Chao, H. C.
    Hung, S. H.
    Park, J. H.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (04) : 400 - 411
  • [44] Policy Architecture for Credential Based Access Control in Open Access Environment
    Dagdee, Nirmal
    Vijaywargiya, Ruchi
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (01): : 39 - 47
  • [45] Supporting relationships in access control using role based access control
    Barkley, J
    Beznosov, K
    Uppal, J
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 55 - 65
  • [46] A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1765 - 1788
  • [47] A Secure and Scalable Group Access Control Scheme for Wireless Sensor Networks
    Vanga Odelu
    Ashok Kumar Das
    Adrijit Goswami
    Wireless Personal Communications, 2015, 85 : 1765 - 1788
  • [48] Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization
    Chen, E.
    Zhu, Yan
    Liang, Kaitai
    Yin, Hongjian
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 579 - 594
  • [49] A secure and effective access control scheme for distributed wireless sensor networks
    Chatterjee, Santanu
    Das, Ashok Kumar
    Sing, Jamuna Kanta
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (01) : 40 - 73
  • [50] A secure WebRTC/WoT-based Health-care Architecture enhanced with Access Control
    El Jaouhari, Saad
    Bouabdallah, Ahmed
    Bonnin, Jean-Marie
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 182 - 187