Ubiquitous access control and policy management in personal networks

被引:0
|
作者
Kyriazanos, Dimitris M. [1 ]
Stassinopoulos, George I.
Prasad, Neeli R.
机构
[1] Natl Tech Univ Athens, Inst Commun & Comp Syst, Athens, Greece
[2] Univ Aalborg, Ctr TeleInFrastruktur, Aalborg, Denmark
关键词
ubiquitous access control; policy management; personal networks; secure service discovery; security profiles;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations.
引用
收藏
页码:394 / 399
页数:6
相关论文
共 50 条
  • [41] A novel QoS Control Scheme using Random Access Period control for wide area ubiquitous wireless networks
    Shimizu, Yoshitaka
    Nuno, Fusao
    Watanabe, Kazuji
    [J]. 2008 14TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS, (APCC), VOLS 1 AND 2, 2008, : 316 - 320
  • [42] Policy algebra for access control in enterprise document management systems
    Tarkhanov, Ivan
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 225 - 228
  • [43] Label-based access control policy enforcement and management
    Zhou, Wei
    Raja, Vinesh H.
    Meinel, Christoph
    Ahmad, Munir
    [J]. SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 395 - +
  • [44] Switchover of access control policy for content management information system
    Wang, Hai-Ling
    Hao, Yu-Jie
    Bai, Jing-Pei
    [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2013, 42 (05): : 749 - 752
  • [45] Access control policy management based on extended-XACML
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    [J]. Tongxin Xuebao, 2007, 1 (103-110):
  • [46] How to leverage access control specification for autonomic policy management
    Vatsavai, RR
    Chakravarthy, S
    Mohania, M
    [J]. ICAC 2005: Second International Conference on Autonomic Computing, Proceedings, 2005, : 358 - 359
  • [47] A Context Policy Management Framework for Ubiquitous Computing
    Li, Yongning
    Pu, Fang
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND AUTOMATION ENGINEERING (ICCAE 2010), VOL 5, 2010, : 491 - 493
  • [48] Scalable ubiquitous data access in clustered sensor networks
    Lee, Yueh-Hua
    Thomo, Alex
    Wu, Kui
    King, Valerie
    [J]. SCIENTIFIC AND STATISTICAL DATABASE MANAGEMENT, PROCEEDINGS, 2008, 5069 : 533 - 540
  • [49] An ontology for privacy policy management in ubiquitous environments
    Fondazzi Martimiano, Luciana Andreia
    Pereira Goncalves, Mueller Roberto
    Moreira, Edson dos Santos
    [J]. 2008 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2008, : 947 - 950
  • [50] Ubiquitous Access Technology for Wireless Digital Home Networks
    Peng Mugen 1Jiang Yong 2Wang Wenbo 1(1. School of Telecommunication Engineering
    2. China Potevio Co.
    [J]. ZTE Communications, 2006, (04) : 40 - 46