Ubiquitous access control and policy management in personal networks

被引:0
|
作者
Kyriazanos, Dimitris M. [1 ]
Stassinopoulos, George I.
Prasad, Neeli R.
机构
[1] Natl Tech Univ Athens, Inst Commun & Comp Syst, Athens, Greece
[2] Univ Aalborg, Ctr TeleInFrastruktur, Aalborg, Denmark
关键词
ubiquitous access control; policy management; personal networks; secure service discovery; security profiles;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations.
引用
收藏
页码:394 / 399
页数:6
相关论文
共 50 条
  • [31] Distributed multiple access control for the wireless mesh personal area networks
    Park, Moo Sung
    Lee, Byungjoo
    Hyong, Seung
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (02): : 258 - 263
  • [32] Policy-based access control framework for large networks
    Duan, HX
    Wu, JP
    Li, X
    [J]. IEEE INTERNATIONAL CONFERENCE ON NETWORKS 2000 (ICON 2000), PROCEEDINGS: NETWORKING TRENDS AND CHALLENGES IN THE NEW MILLENNIUM, 2000, : 267 - 272
  • [33] Hierarchical policy based management architecture to support the deployment and the discovery of services in ubiquitous networks
    Ghanui-Doudane, S
    Agoulmine, N
    [J]. LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 126 - 133
  • [34] Access Control Policy Misconfiguration Detection in Online Social Networks
    Javed, Yousra
    Shehab, Mohamed
    [J]. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 544 - 549
  • [35] Enforcement of Access Control Policy for Mobile Ad Hoc Networks
    Maity, Soumya
    Ghosh, Soumya K.
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 47 - 52
  • [36] Policy-based access control framework for large networks
    Duan, Hai-Xin
    Wu, Jian-Ping
    Li, Xing
    [J]. Ruan Jian Xue Bao/Journal of Software, 2001, 12 (12): : 1739 - 1747
  • [37] Policy-Based Access Control for Body Sensor Networks
    Manifavas, Charalampos
    Fysarakis, Konstantinos
    Rantos, Konstantinos
    Kagiambakis, Konstantinos
    Papaefstathiou, Ioannis
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 150 - 159
  • [38] Semantic Access Control for Privacy Management of Personal Sensing in Smart Cities
    Drozdowicz, Michal
    Ganzha, Maria
    Paprzycki, Marcin
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (01) : 199 - 210
  • [39] Ubiquitous Internet access control:: the PAPI system
    López, DR
    Castro-Rojo, R
    [J]. 13TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2002, : 441 - 445
  • [40] Policy algebra for access control in enterprise document management systems
    Tarkhanov, Ivan
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 225 - 228