Ubiquitous access control and policy management in personal networks

被引:0
|
作者
Kyriazanos, Dimitris M. [1 ]
Stassinopoulos, George I.
Prasad, Neeli R.
机构
[1] Natl Tech Univ Athens, Inst Commun & Comp Syst, Athens, Greece
[2] Univ Aalborg, Ctr TeleInFrastruktur, Aalborg, Denmark
关键词
ubiquitous access control; policy management; personal networks; secure service discovery; security profiles;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations.
引用
收藏
页码:394 / 399
页数:6
相关论文
共 50 条
  • [1] Ubiquitous access control and policy management in personal networks
    Kyriazanos, Dimitris M.
    Stassinopoulos, George I.
    Prasad, Neeli R.
    [J]. 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 397 - +
  • [2] Access control management for ubiquitous computing
    Wang, Hua
    Zhang, Yanchun
    Cao, Jinli
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2008, 24 (08): : 870 - 878
  • [3] Policy Management for Secure Data Access Control in Vehicular Networks
    Huang, Dijiang
    Tsai, Wei-Tek
    Tseng, Yi-hsin
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (04) : 448 - 471
  • [4] Policy Management for Secure Data Access Control in Vehicular Networks
    Dijiang Huang
    Wei-Tek Tsai
    Yi-hsin Tseng
    [J]. Journal of Network and Systems Management, 2011, 19 : 448 - 471
  • [5] Policy based access management and handover control in heterogeneous wireless networks
    Murray, K
    Pesch, D
    [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3319 - 3323
  • [6] Visitor access management in personal wireless networks
    Asokan, N
    Moloney, S
    Ginzboorg, P
    Kostiainen, K
    [J]. ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 686 - 693
  • [7] An access control policy for active networks
    Xia, ZY
    Jiang, YC
    Zhong, YP
    Zhang, SY
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 369 - 374
  • [8] Multi-policy access control considering privacy in ubiquitous environment
    Kim, Kyu-il
    Hwang, Hyun-Sik
    Ko, Hyuk-Jin
    Lee, Hae-Kyung
    Kim, Ung-mo
    [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 216 - +
  • [9] Context-based access control management in ubiquitous environments
    Corradi, A
    Montanari, R
    Tibaldi, D
    [J]. THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS, 2004, : 253 - 260
  • [10] The Daemon as Educator: Ubiquitous Access to A Personal Mentor
    Rosell, Bernard
    Sirbu, Raluca
    [J]. ICSIT 2010: INTERNATIONAL CONFERENCE ON SOCIETY AND INFORMATION TECHNOLOGIES (POST-CONFERENCE EDITION), 2010, : 396 - 402