Ubiquitous access control and policy management in personal networks

DSpace/Manakin Repository

Show simple item record

dc.contributor.author Kyriazanos, DM en
dc.contributor.author Stassinopoulos, GI en
dc.contributor.author Prasad, NR en
dc.date.accessioned 2014-03-01T02:44:21Z
dc.date.available 2014-03-01T02:44:21Z
dc.date.issued 2006 en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/31766
dc.subject Personal networks, secure service discovery en
dc.subject Policy management en
dc.subject Security profiles en
dc.subject Ubiquitous access control en
dc.subject.other Access control en
dc.subject.other Mobile telecommunication systems en
dc.subject.other Quality of service en
dc.subject.other Security systems en
dc.subject.other Access points en
dc.subject.other Distributed architectures en
dc.subject.other International conferences en
dc.subject.other Peer-to-peer interactions en
dc.subject.other Personal network en
dc.subject.other Personal networks en
dc.subject.other Personal networks, secure service discovery en
dc.subject.other Policy management en
dc.subject.other Security domains en
dc.subject.other Security policies en
dc.subject.other Security profiles en
dc.subject.other Ubiquitous access en
dc.subject.other Ubiquitous access control en
dc.subject.other Ubiquitous Systems en
dc.subject.other Ubiquitous computing en
dc.title Ubiquitous access control and policy management in personal networks en
heal.type conferenceItem en
heal.identifier.primary 10.1109/MOBIQW.2006.361770 en
heal.identifier.secondary 4205295 en
heal.identifier.secondary http://dx.doi.org/10.1109/MOBIQW.2006.361770 en
heal.publicationDate 2006 en
heal.abstract In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures -having in this case distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations. © 2006 IEEE. en
heal.journalName 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems, MobiQuitous - Workshops en
dc.identifier.doi 10.1109/MOBIQW.2006.361770 en

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record