Citations
304 | TRBAC:A temporal role-based access control model,”
- Bertino, Bonatti, et al.
- 2001
(Show Context)
Citation Context ...s conclusion and future works. 1.2 Related Works Recent researches have shown that wireless ad hoc networks are highly vulnerable to various security threats due to their inherent characteristics [8] =-=[9]-=-. This leaves ad hoc key management and key distribution as a wide open problem. There has been a rich literature on public key management in MANETs, [10] [11] [12] [13] [14] [15]. These schemes all d... |
42 | SRBAC: A Spatial role-based access control model for mobile systems,”
- Hansen, Oleschuk
- 2003
(Show Context)
Citation Context ...ntity information, thus eliminating the need for public key distribution and certificates. This featured inspired a few IBC-based certificateless public key management schemes for MANETs such as [17] =-=[18]-=-[19][20]. The basic idea is to let some [17] [18] [20] or all network nodes called a shareholders, share a network master-key using threshold cryptography [21] [22] and collaboratively issue ID-based ... |
27 | Temporal hierarchies and inheritance semantics for GTRBAC, in:
- Joshi, Bertino, et al.
- 2002
(Show Context)
Citation Context ...o their inherent characteristics [8] [9]. This leaves ad hoc key management and key distribution as a wide open problem. There has been a rich literature on public key management in MANETs, [10] [11] =-=[12]-=- [13] [14] [15]. These schemes all depend on certificatebased cryptography (CBC), which uses public key certificates to authenticate public keys by binding public keys to the owner’s identities. A mai... |
22 | Towards a location-based mandatory access control model.
- Ray, Kumar
- 2006
(Show Context)
Citation Context ...herent characteristics [8] [9]. This leaves ad hoc key management and key distribution as a wide open problem. There has been a rich literature on public key management in MANETs, [10] [11] [12] [13] =-=[14]-=- [15]. These schemes all depend on certificatebased cryptography (CBC), which uses public key certificates to authenticate public keys by binding public keys to the owner’s identities. A main concern ... |
15 |
Lot-rbac: A location and time-based rbac model.
- Chandran, Joshi
- 2005
(Show Context)
Citation Context ...en gaining momentum in recent years. The idea of Identity based cryptosystem was first proposed by Shamir [15] to simplify the conventional public key cryptosystem, and make the key management easier =-=[16]-=-. Khalili, et. al proposed a protocol for management and authentication in an ad hoc network that is based on an ID-based scheme in [17]. It allows public keys to be derived from entities known identi... |
13 | Location history in low-cost context awareness environment.
- Mantoro, Johnson
- 2003
(Show Context)
Citation Context ...ir inherent characteristics [8] [9]. This leaves ad hoc key management and key distribution as a wide open problem. There has been a rich literature on public key management in MANETs, [10] [11] [12] =-=[13]-=- [14] [15]. These schemes all depend on certificatebased cryptography (CBC), which uses public key certificates to authenticate public keys by binding public keys to the owner’s identities. A main con... |
11 |
A coordinated spatio-temporal access control model for mobile computing in coalition environments
- Fu, Xu
- 2005
(Show Context)
Citation Context ...nal public key cryptosystem, and make the key management easier [16]. Khalili, et. al proposed a protocol for management and authentication in an ad hoc network that is based on an ID-based scheme in =-=[17]-=-. It allows public keys to be derived from entities known identity information, thus eliminating the need for public key distribution and certificates. This featured inspired a few IBC-based certifica... |
8 | Committee on Banking, Housing and Urban Affairs - Senate |
8 | Privacy as an operating system service
- Ioannidis, Sidiroglou, et al.
- 2006
(Show Context)
Citation Context ...cy [6]. Conventional key management techniques may either require an online trusted server or not. The infrastructureless nature of MANETs precludes the use of server based protocols such as Kerberos =-=[7]-=-. There are two intuitive International Journal of Security (IJS), Volume (3) : Issue (1) 1Prof. Anil Kapil & Mr. Sanjeev Rana symmetric-key solutions, though neither is satisfactory. The first one i... |
6 |
Dependencies and separation of duty constraints
- Joshi, Shafiq, et al.
- 2003
(Show Context)
Citation Context ...due to their inherent characteristics [8] [9]. This leaves ad hoc key management and key distribution as a wide open problem. There has been a rich literature on public key management in MANETs, [10] =-=[11]-=- [12] [13] [14] [15]. These schemes all depend on certificatebased cryptography (CBC), which uses public key certificates to authenticate public keys by binding public keys to the owner’s identities. ... |
5 |
Contextual Role-Based Access Control
- Tahir
- 2007
(Show Context)
Citation Context ...y, quality of service and security that need to be solved before implementing these network technologies in practice. Most of the research that has been done on ad hoc networking has faced on routing =-=[1]-=- [2] [3]. Other issues such as security and network addressing have received considerably less attention [4] [5]. Designing and implementing any kind of security scheme requires a secret to set up a t... |
5 |
Insurance Portability & Accountability Act [HIPAA
- Health
- 1996
(Show Context)
Citation Context ...ty of service and security that need to be solved before implementing these network technologies in practice. Most of the research that has been done on ad hoc networking has faced on routing [1] [2] =-=[3]-=-. Other issues such as security and network addressing have received considerably less attention [4] [5]. Designing and implementing any kind of security scheme requires a secret to set up a trust rel... |
4 |
GEO-RBAC: A Spatially AwareRBAC
- Bertino, Catania, et al.
- 2005
(Show Context)
Citation Context ...t characteristics [8] [9]. This leaves ad hoc key management and key distribution as a wide open problem. There has been a rich literature on public key management in MANETs, [10] [11] [12] [13] [14] =-=[15]-=-. These schemes all depend on certificatebased cryptography (CBC), which uses public key certificates to authenticate public keys by binding public keys to the owner’s identities. A main concern with ... |
3 |
The Personal Information Protection and Electronic Documents Act
- PIPEDA
- 2000
(Show Context)
Citation Context ...tice. Most of the research that has been done on ad hoc networking has faced on routing [1] [2] [3]. Other issues such as security and network addressing have received considerably less attention [4] =-=[5]-=-. Designing and implementing any kind of security scheme requires a secret to set up a trust relationship between two or more communicating parties. For example, the ability of node A to trust node B ... |
2 |
Health Insurance Portability and Accountability Act (HIPAA)-compliant Privacy Access Control Model for Web Services
- Ying
- 2006
(Show Context)
Citation Context ... scheme. The fundamental security services provided by every key management system are key synchronism, secrecy, freshness, independence, authentication, confirmation and forward and backward secrecy =-=[6]-=-. Conventional key management techniques may either require an online trusted server or not. The infrastructureless nature of MANETs precludes the use of server based protocols such as Kerberos [7]. T... |