The RBAC based privilege management for authorization of wireless networks

被引:0
|
作者
Park, DG [1 ]
Lee, YR [1 ]
机构
[1] Soonchunhyang Univ, Coll Engn, Dept Informat & Technol Engn, Asan, Choongnam, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
M-commerce have grown rapidly, it is very important to determine whether an identity is permitted to access a resource in mobile environments. In this paper we propose RBAC based Wireless Privilege Management Infrastructure(WPMI) model and Wireless Attribute Certificate(WAC) for authorization in mobile communication. All access control decisions are driven by an authorization policy, which is itself stored in an WAC. Authorization policies are written in XML according to a DTD that has been published at XML.org. Finally we show the effectiveness of the proposed RBAC by applying it to an example of M-commerce service.
引用
收藏
页码:314 / 326
页数:13
相关论文
共 50 条
  • [41] Handling least privilege problem and role mining in RBAC
    Hejiao Huang
    Feng Shang
    Jinling Liu
    Hongwei Du
    Journal of Combinatorial Optimization, 2015, 30 : 63 - 86
  • [42] Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks
    Song, Hui
    Zhu, Sencun
    Zhang, Wensheng
    Cao, Guohong
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (04)
  • [43] An Authorization Model of Quantitative Analysis of the Least Privilege
    Wang, Hui
    Liu, Lianzhong
    Tian, Wanli
    2012 6TH INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION SCIENCE, SERVICE SCIENCE AND DATA MINING (ISSDM2012), 2012, : 283 - 288
  • [44] A unified authorization platform based on RBAC4WAS model for web application system integration
    Zhu, QM
    Li, PF
    Su, Z
    Peide, Q
    2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 505 - 509
  • [45] Towards complexity analysis of User Authorization Query problem in RBAC
    Lu, Jianfeng
    Joshi, James B. D.
    Jin, Lei
    Liu, Yiding
    COMPUTERS & SECURITY, 2015, 48 : 116 - 130
  • [46] A Cross Cloud Authorization Mechanism Using NFC and RBAC Technology
    Chan, Jun-Fu
    Yang, Ta-Chih
    Liaw, Horng Twu
    UBIQUITOUS COMPUTING APPLICATION AND WIRELESS SENSOR, 2015, 331 : 239 - 246
  • [47] VeRA: Verifying RBAC and Authorization Constraints Models of Web Applications
    Thanh-Nhan Luong
    Hanh-Phuc Nguyen
    Ninh-Thuan Truong
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2021, 31 (05) : 655 - 675
  • [48] FWAM: A flexible workflow authorization model using extended RBAC
    Yang, Le
    Choi, Yongsun
    Choi, Myeonggil
    Zhao, Xinlei
    PROCEEDINGS OF THE 2008 12TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOLS I AND II, 2008, : 625 - +
  • [49] Policy language based management model for wireless networks
    Wallenius, E
    Grosse-Kreul, M
    Hämäläinen, T
    NETWORKS 2004 11TH INTERNATIONAL TELECOMMUNICATIONS NETWORK STRATEGY AND PLANNING SYMPOSIUM, PROCEEDINGS, 2004, : 249 - 254
  • [50] Prediction Based Handovers for Wireless Networks Resources Management
    Rygielski, Piotr
    Swiatek, Pawel
    Juszczyszyn, Krzysztof
    Grzech, Adam
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT II: 15TH INTERNATIONAL CONFERENCE, KES 2011, 2011, 6882 : 687 - 696