dc.contributor.author |
Kyriazanos, DM |
en |
dc.contributor.author |
Stassinopoulos, GI |
en |
dc.contributor.author |
Prasad, NR |
en |
dc.date.accessioned |
2014-03-01T02:44:21Z |
|
dc.date.available |
2014-03-01T02:44:21Z |
|
dc.date.issued |
2006 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/31766 |
|
dc.subject |
Personal networks, secure service discovery |
en |
dc.subject |
Policy management |
en |
dc.subject |
Security profiles |
en |
dc.subject |
Ubiquitous access control |
en |
dc.subject.other |
Access control |
en |
dc.subject.other |
Mobile telecommunication systems |
en |
dc.subject.other |
Quality of service |
en |
dc.subject.other |
Security systems |
en |
dc.subject.other |
Access points |
en |
dc.subject.other |
Distributed architectures |
en |
dc.subject.other |
International conferences |
en |
dc.subject.other |
Peer-to-peer interactions |
en |
dc.subject.other |
Personal network |
en |
dc.subject.other |
Personal networks |
en |
dc.subject.other |
Personal networks, secure service discovery |
en |
dc.subject.other |
Policy management |
en |
dc.subject.other |
Security domains |
en |
dc.subject.other |
Security policies |
en |
dc.subject.other |
Security profiles |
en |
dc.subject.other |
Ubiquitous access |
en |
dc.subject.other |
Ubiquitous access control |
en |
dc.subject.other |
Ubiquitous Systems |
en |
dc.subject.other |
Ubiquitous computing |
en |
dc.title |
Ubiquitous access control and policy management in personal networks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/MOBIQW.2006.361770 |
en |
heal.identifier.secondary |
4205295 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/MOBIQW.2006.361770 |
en |
heal.publicationDate |
2006 |
en |
heal.abstract |
In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures -having in this case distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations. © 2006 IEEE. |
en |
heal.journalName |
2006 3rd Annual International Conference on Mobile and Ubiquitous Systems, MobiQuitous - Workshops |
en |
dc.identifier.doi |
10.1109/MOBIQW.2006.361770 |
en |