Citations
1062 | Securing ad hoc networks
- Zhou, Haas
- 1999
(Show Context)
Citation Context ...istributed way. The governing rules regarding authorization either to grant or to deny can be acquired by the PDP in different ways[6] namely, Agent, Push and Pull models. Trust model as suggested in =-=[2]-=- defines a policy database, evaluator and result of evaluation. It goes true only when dynamic, flexible and fine grained policies are maintained in a structured and simple manner. Even though dynamic... |
597 | Secure routing for mobile ad-hoc networks
- Papadimitratos, Haas
- 2002
(Show Context)
Citation Context ...the assertion stated in the credential remains true until its pre-ordained expiration time) then policy evaluation can be reduced to the problem of stable predicate evaluation on distributed snapshots=-=[3]-=-. 3. SHORTCOMINGS IN AUTHORIZATION TECHNIQUES IN CURRENT GRID ENVIRONMENTS As mentioned in the above section, authorizations in grids are incorporated or suggested in many models or papers. They all h... |
94 |
A survey of security issues in mobile ad hoc and sensor networks”,
- Djenouri, Khelladi, et al.
- 2005
(Show Context)
Citation Context ...ogether. 2. AUTHORIZATION IN CURRENT GRID ENVIRONMENTS Authorization has been taken care of by user identity and access control lists (distributed grid map files) in Grid Security Infrastructure (GSI)=-=[1]-=- incorporated in GT4.0. Also certain suggestions of a model where two points of action is required, namely, Policy Decision Point (PDP) and Policy Enforcement Point (PEP)[5]. The first one decides ove... |
54 | Authenticated routing for ad hoc networks.
- Sanzgiri, LaFlamme, et al.
- 2005
(Show Context)
Citation Context ...olicies are maintained as property based certificates in International Journal of Security, (IJS), Volume (3) : Issue(4) 50Ajay Prasad, Saurabh Singh Verma & Ashok Kumar Sharma PRIMA[7], VOMS[8], CAS=-=[9]-=- and X.509 attribute certificates[10] there is no standard interface for using them yet. Globus Resource Acquisition and Management (GRAM) system maintains policy mappings using gatekeeper and Job man... |
41 |
Ad Hoc Wireless Networks
- Murthy, Manoj
- 2004
(Show Context)
Citation Context ...nt situations, are considered. 2. EXPERT SYSTEMS Expert systems are attempts to crystallize and codify the knowledge and skills of one or more experts into a tool that can be used by non-specialists, =-=[14]-=-. An expert system can be decomposed as follows: Expert system = knowledge base + Inference engine. The first term on the right-hand side of the equation, knowledge base, refers the specific knowledge... |
33 |
Collaborative security architecture for black hole attack prevention in mobile ad-hoc networks,”
- Patcha, Mishra
- 2003
(Show Context)
Citation Context ...ibute certificates[10] there is no standard interface for using them yet. Globus Resource Acquisition and Management (GRAM) system maintains policy mappings using gatekeeper and Job manager components=-=[12]-=-. Akenti Policy language[11] expresses policy in XML and store in three types of signed certificates: policy certificates, usecondition certificates and Akenti attribute certificates[11]. A proposed p... |
27 |
Routing security in ad hoc networks,”
- Deng, Li, et al.
- 2002
(Show Context)
Citation Context ... though dynamic policies are maintained as property based certificates in International Journal of Security, (IJS), Volume (3) : Issue(4) 50Ajay Prasad, Saurabh Singh Verma & Ashok Kumar Sharma PRIMA=-=[7]-=-, VOMS[8], CAS[9] and X.509 attribute certificates[10] there is no standard interface for using them yet. Globus Resource Acquisition and Management (GRAM) system maintains policy mappings using gatek... |
14 |
Hole Attack
- Shurman, Park
- 2004
(Show Context)
Citation Context ...ynamic policies are maintained as property based certificates in International Journal of Security, (IJS), Volume (3) : Issue(4) 50Ajay Prasad, Saurabh Singh Verma & Ashok Kumar Sharma PRIMA[7], VOMS=-=[8]-=-, CAS[9] and X.509 attribute certificates[10] there is no standard interface for using them yet. Globus Resource Acquisition and Management (GRAM) system maintains policy mappings using gatekeeper and... |
9 |
Detecting Black Hole attack in Mobile adhoc Networks”. The
- Sun, Guan, et al.
(Show Context)
Citation Context ...ased certificates in International Journal of Security, (IJS), Volume (3) : Issue(4) 50Ajay Prasad, Saurabh Singh Verma & Ashok Kumar Sharma PRIMA[7], VOMS[8], CAS[9] and X.509 attribute certificates=-=[10]-=- there is no standard interface for using them yet. Globus Resource Acquisition and Management (GRAM) system maintains policy mappings using gatekeeper and Job manager components[12]. Akenti Policy la... |
7 |
Performance Evaluation of mesh based multicast reactive routing protocol under black hole attack
- Anita, Vasudevan
- 2009
(Show Context)
Citation Context ...information along with certification to be carried during the lifetime of the process or job or request for resource. The safety and consistency in policy based authorisation systems are discussed in =-=[4]-=- suggest that the collection of credentials used to satisfy a given authorization policy acts as a partial snapshot of the system within which the policy is evaluated. The correctness of an authorizat... |
6 |
and C.Chain, On Demand Multicast Routing protocol-(ODMRP
- Lee
- 1999
(Show Context)
Citation Context ...curity Infrastructure (GSI)[1] incorporated in GT4.0. Also certain suggestions of a model where two points of action is required, namely, Policy Decision Point (PDP) and Policy Enforcement Point (PEP)=-=[5]-=-. The first one decides over the policy matters and the latter enforces the policies decided. The model can be realized both in simple and manageable centralized way or a complex but performance orien... |
6 |
Black Hole Attack on Multicast Routing Protocols”, jcit. Vol.4.issue2.anita
- Anita, Vasudevan
(Show Context)
Citation Context ... consists of authentication and authorization. Authorization is to perform the necessary action to confirm that an authenticated entity is allowed to perform an action on a resource[14]. As stated in =-=[13]-=- there are two general approaches for authorization: identity-based or token-based. The identity based authorization mainly depends upon user identity and access control lists. On the other hand token... |
4 |
Evaluation of Multicasting Algorithms
- Vasiliou, Economides
- 2005
(Show Context)
Citation Context ...nd manageable centralized way or a complex but performance oriented distributed way. The governing rules regarding authorization either to grant or to deny can be acquired by the PDP in different ways=-=[6]-=- namely, Agent, Push and Pull models. Trust model as suggested in [2] defines a policy database, evaluator and result of evaluation. It goes true only when dynamic, flexible and fine grained policies ... |
3 |
A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network
- Sehgal, Nath
(Show Context)
Citation Context ... is no standard interface for using them yet. Globus Resource Acquisition and Management (GRAM) system maintains policy mappings using gatekeeper and Job manager components[12]. Akenti Policy language=-=[11]-=- expresses policy in XML and store in three types of signed certificates: policy certificates, usecondition certificates and Akenti attribute certificates[11]. A proposed privacy, trust and policy bas... |