Filters








21,815 Hits in 7.3 sec

Software Defined (SDN) Based Internet of Things (IoT) networks

BÎRLEANU S.
<span title="2021-07-15">2021</span> <i title="Mircea cel Batran Naval Academy"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/267jnebqbbf7newhevyxawbqea" style="color: black;">Scientific Bulletin of Naval Academy</a> </i> &nbsp;
Software-Defined Networking - SDN solves existing network-level problems by providing the ability to build increasingly complex IoT-based systems in a simpler and more flexible manner.  ...  In addition, IoT devices are not designed to allow centralized management and control.  ...  Tomovic in SoftRAN: Software defined radio access network, Uses the SDN principle in the 4G LTE network. A centralized control plan abstracts the entire RAN in the geographical area.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21279/1454-864x-21-i1-012">doi:10.21279/1454-864x-21-i1-012</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tjtge2dkfbegjg6wcuwpo34r54">fatcat:tjtge2dkfbegjg6wcuwpo34r54</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211014110506/https://www.anmb.ro/buletinstiintific/buletine/2021_Issue1/02_EEA/103-110.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/57/47/5747bb8e8948c25bdb463e7efad389ce9b1d5730.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21279/1454-864x-21-i1-012"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Blockchain-Based Secured Access Control in an IoT System

Sultan Algarni, Fathy Eassa, Khalid Almarhabi, Abduallah Almalaise, Emad Albassam, Khalid Alsubhi, Mohammad Yamin
<span title="2021-02-17">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/smrngspzhzce7dy6ofycrfxbim" style="color: black;">Applied Sciences</a> </i> &nbsp;
The main objective of the proposed solution is to build Blockchain Managers (BCMs) for securing IoT access control, as well as allowing for secure communication between local IoT devices.  ...  Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain.  ...  Access Control in IoT Access Control (AC) involves the authentication and authorization of communication rights and resource access with respect to defined security guidelines and policies [4] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11041772">doi:10.3390/app11041772</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/banim6a4djbwbedfvr7cbskrpq">fatcat:banim6a4djbwbedfvr7cbskrpq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210427193832/https://res.mdpi.com/d_attachment/applsci/applsci-11-01772/article_deploy/applsci-11-01772.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/95/e6/95e68e0f3ec0c10326d39b5f79eaa92a496dbe59.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/app11041772"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Security Trust Zone in 5G networks

Bin Han, Stan Wong, Christian Mannweiler, Mischa Dohler, Hans D. Schotten
<span title="">2017</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/g3gs7xuhgbbx7bbs2sqkj6iy2e" style="color: black;">2017 24th International Conference on Telecommunications (ICT)</a> </i> &nbsp;
TZ also provides an autonomous and decentralized security policy for different tenants under variable network conditions.  ...  We propose a novel architectural security solution that applies to 5G networks. It is called Trust Zone (TZ) that is designed as an enhancement of the 5G AAA in the edge cloud.  ...  slicing and software-defined network control and management.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ict.2017.7998270">doi:10.1109/ict.2017.7998270</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ict/HanWMDS17.html">dblp:conf/ict/HanWMDS17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/idbfcdfc6vat3a223jyhh5mx3q">fatcat:idbfcdfc6vat3a223jyhh5mx3q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200905125409/https://arxiv.org/pdf/1709.03790v1.pdf" title="fulltext PDF download [not primary version]" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <span style="color: #f43e3e;">&#10033;</span> <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/32/d5/32d5c188661d5b05a5f1b9e50a42d3f90803179c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ict.2017.7998270"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Security Issues in Software Defined Networking (SDN): Risks, Challenges and Potential Solutions

Maham Iqbal, Farwa Iqbal, Fatima Mohsin, Muhammad Rizwan, Fahad Ahmad
<span title="">2019</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
SDN (Software Defined Networking) is an architecture that aims to improve the control of network and flexibility.  ...  These techniques are useful for enhancing the security framework of the controller.  ...  The present paper reviews the hard work and challenges required to enforce security in software defined networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2019.0101042">doi:10.14569/ijacsa.2019.0101042</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/y6f4l3ml45dmtn6g44ymcq5wqm">fatcat:y6f4l3ml45dmtn6g44ymcq5wqm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200208120845/https://thesai.org/Downloads/Volume10No10/Paper_42-Security_Issues_in_Software_Defined_Networking.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0e/50/0e50116b4714e496ab07c4af22242846630739ea.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2019.0101042"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Data Security Monitoring Platform in Cloud for Enterprise

Geng Yushui, Pang Shunpeng
<span title="2013-11-30">2013</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/4h7flaxsjnh6he3qbiwvxbekxe" style="color: black;">International Journal of Security and Its Applications</a> </i> &nbsp;
The model can set the authentication, logging, fine-grained access control, dynamic data filtering strategy and data audit to realize the security protection for enterprises data.  ...  The model proposed by this paper uses multi-tenancy SaaS(Software as Service) application architecture, RBAC (Role-Based policies Access Control) model and operation in the context of environmental perception  ...  It provides centralized authentication, authorization and access control for multiple services and users in the cloud environment to ensure the consistency of the data security policy enforcement.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2013.7.6.07">doi:10.14257/ijsia.2013.7.6.07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ls47dplocbcd7feetif7opapte">fatcat:ls47dplocbcd7feetif7opapte</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180603230443/http://www.sersc.org/journals/IJSIA/vol7_no6_2013/7.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/34/f8/34f87b56e99ac08a020bff5be4e5db627c491d63.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/ijsia.2013.7.6.07"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A brief overview of intelligent mobility management for future wireless mobile networks

Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
<span title="2017-11-13">2017</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a5gjzjadkzbirdua4xdqipotp4" style="color: black;">EURASIP Journal on Wireless Communications and Networking</a> </i> &nbsp;
Click here to let us know how access to this document benefits you.  ...  Finally, we also thank all the authors for their interests and for submitting their works for consideration for publication in this special issue.  ...  We thank all the reviewers for their efforts and for all their valuable and constructive comments which helped us to select the highest quality and most relevant papers for this issue.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-017-0972-6">doi:10.1186/s13638-017-0972-6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/o523esfycfgqpmbo3n7livww64">fatcat:o523esfycfgqpmbo3n7livww64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190426073103/https://uknowledge.uky.edu/cgi/viewcontent.cgi?article=1038&amp;context=slis_facpub" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7b/9e/7b9e31c4cc8878260e9a5baa12db4f06249035e8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-017-0972-6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Hierarchical, virtualised and distributed intelligence 5G architecture for low-latency and secure applications

M.S. Siddiqui, A. Legarrea, E. Escalona, M.C. Parker, G. Koczian, S.D. Walker, G. Lyberopoulos, E. Theodoropoulou, K. Filis, A. Foglar, M. Ulbricht, Y. Liu (+11 others)
<span title="2016-07-22">2016</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wuw4sh5ufve5hbbawxmr7y7cre" style="color: black;">Transactions on Emerging Telecommunications Technologies</a> </i> &nbsp;
In this paper, we present the key drivers and requirements towards a hierarchical, distributed-intelligence 5G architecture, supporting low latency, security, and open access as features intrinsic to its  ...  CHARISMA aims to tackle low-latency and endto-end security for converged fixed/wireless 5G networks in order to meet the complex demands of emerging business paradigms, such as Smart Cities, eHealth, and  ...  This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 671704.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/ett.3072">doi:10.1002/ett.3072</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/btyou2dtkvbixaavjxdop5tixu">fatcat:btyou2dtkvbixaavjxdop5tixu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307081656/https://recercat.cat/bitstream/handle/2072/355264/Siddiqui-TETT2016Hierarchicalvirtualisedanddistributedintelligence5Garchitectureforlow-latencyandsecureapplicationsCHARISMA.pdf;jsessionid=F9DAEEA3B6B1A030CDB0BCB089D55DA6.recercat1?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/93/0d/930d70896a34af267cbbe4cffbdd517859128689.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/ett.3072"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Hierarchical, Virtualized, And Distributed Intelligence 5G Architecture For Low-Latency And Secure Applications

M.S. Siddiqui, A. Legarrea, E. Escalona, M.C. Parker, G. Koczian, S.D. Walker, G. Lyberopoulos, E. Theodoropoulou, K. Filis, A. Foglar, M. Ulbricht, Y. Liu (+11 others)
<span title="2016-06-01">2016</span> <i title="Zenodo"> Zenodo </i> &nbsp;
In this paper, we present the key drivers and requirements towards a hierarchical, distributed-intelligence 5G architecture, supporting low latency, security, and open access as features intrinsic to its  ...  CHARISMA aims to tackle low-latency and end- to-end security for converged fixed/wireless 5G networks in order to meet the complex demands of emerging business paradigms, such as Smart Cities, eHealth,  ...  This project has received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No. 671704.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1196818">doi:10.5281/zenodo.1196818</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3d7nx2riwfgvtlnuhye47xrcou">fatcat:3d7nx2riwfgvtlnuhye47xrcou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200227124628/https://zenodo.org/record/1196818/files/CHARISMA-5G-TETT2016.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8c/41/8c41b796e691efe693d97a98185a923748c9a770.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.1196818"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Security in cloud computing: Opportunities and challenges

Mazhar Ali, Samee U. Khan, Athanasios V. Vasilakos
<span title="">2015</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ozlq63ehnjeqxf6cuxxn27cqra" style="color: black;">Information Sciences</a> </i> &nbsp;
In HASBE, Root authority is trusted by the domain level, and domain is trusted by subdomain level authorities or users. The access control is also defined as a hierarchical tree structure.  ...   [86], author proposed use of ABE and the Attribute Based Signature (ABS) for access control and anonymous authentication.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ins.2015.01.025">doi:10.1016/j.ins.2015.01.025</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rpphgda2lvhovmzmldsd7ict6y">fatcat:rpphgda2lvhovmzmldsd7ict6y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809051226/http://www.parkjonghyuk.net/lecture/2015-1st-lecture/networksecurity/Paper2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bc/c0/bcc003af5d41e69f7985bed12e1c0860963f8fe7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.ins.2015.01.025"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> elsevier.com </button> </a>

Software-Defined Networks (SDNs) and Internet of Things (IoTs): A Qualitative Prediction for 2020

Sahrish Khan, Munam Ali, Naila Sher, Yousra Asim, Wajeeha Naeem, Muhammad Kamran
<span title="">2016</span> <i title="The Science and Information Organization"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2yzw5hsmlfa6bkafwsibbudu64" style="color: black;">International Journal of Advanced Computer Science and Applications</a> </i> &nbsp;
On the other hand, a Software Define Network (SDN) provides a centralised and programmable control and management for the underlying network without changing existing network architecture.  ...  Programmability and centralised control are considered an alternative solution to address IoT issues.  ...  The most attracted technologies in this domain are Software Defined Networking (SDN), and Network Function Virtualization (NFV).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2016.071151">doi:10.14569/ijacsa.2016.071151</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wtpgs25ggfbuxbqun4pmesya7q">fatcat:wtpgs25ggfbuxbqun4pmesya7q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719041217/http://thesai.org/Downloads/Volume7No11/Paper_51-Software_Defined_Networks_SDNs.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/29/18/2918c83d31266c7b72a792c15a0f36176e5619f6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14569/ijacsa.2016.071151"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Common Criteria Requirement of Data Leakage Protection System

Hyun-Jung Lee, Seung-Eun Jeong, Jae-In Shin, Kab-Seung Kou
<span title="2014-02-28">2014</span> <i title="Science and Engineering Research Support Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q525ek5lwzf5jjfwg5nubjiocu" style="color: black;">Journal of Security Engineering</a> </i> &nbsp;
In this paper, we deduce Security functionality which DLP should have for protecting proprietary information leakage as using ISO 14598. 1 138-200 TA Team, Korea System Assurance, Munjeong-dong,  ...  The companies which happened the security accident damage as falling stocks and sales, collective damages and these damages effect on management in the companies.  ...  Typically a software or hardware solution that is installed at network egress points near the perimeter.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/jse.2014.02.10">doi:10.14257/jse.2014.02.10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/sx4dpvkcvnaltb74ehg7uk2j7e">fatcat:sx4dpvkcvnaltb74ehg7uk2j7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602214523/http://www.sersc.org/journals/JSE/vol11_no1_2014/6.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bb/1f/bb1f18814d2da36cab37970fd5365d50c2131394.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14257/jse.2014.02.10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Study on Security and Privacy in 5G-Enabled Applications

Qin Qiu, Shenglan Liu, Sijia Xu, Shengquan Yu, Ding Wang
<span title="2020-12-19">2020</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
This paper analyzes the security requirements and presents hierarchical solutions for stakeholders to build secure 5G applications.  ...  Finally, we present a use case of industrial terminal access control and make conclusions of this paper.  ...  Acknowledgments This paper is supported by the construction project of the Joint Laboratory for Mobile Learning, Ministry of Education-China Mobile Communications Corporation (no. ML2012934).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/8856683">doi:10.1155/2020/8856683</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hftuhem6jzalxcod3bci6vvxna">fatcat:hftuhem6jzalxcod3bci6vvxna</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220421021023/https://downloads.hindawi.com/journals/wcmc/2020/8856683.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/02/95/0295d74e756b2109d1dab201780681359e81fd72.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2020/8856683"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Inventions on LDAP Security - A TRIZ Based Analysis

Umakant Mishra
<span title="">2006</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tol7woxlqjeg5bmzadeg6qrg3e" style="color: black;">Social Science Research Network</a> </i> &nbsp;
Every hardware and software (and even others) has to follow the policies and protocols for effective interaction in the network.  ...  Processing sparse hierarchical ACL data in RDBMS US Patent 6823338 discloses a method for processing Access Control List (ACL) for LDAP in a relational database.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2139/ssrn.925928">doi:10.2139/ssrn.925928</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lqbgwpjtffavvdoftcniqfurw4">fatcat:lqbgwpjtffavvdoftcniqfurw4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200325003218/https://works.bepress.com/umakant_mishra/55/download/" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/a8/70a8109cea18c18bf82c4b107bfd6cfa25911f81.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2139/ssrn.925928"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ssrn.com </button> </a>

Managing Access to Service Providers in Federated Identity Environments: A Case Study in a Cloud Storage Service

Thomas Diniz, Andre Castro de Felippe, Taina Medeiros, Carlos Eduardo da Silva, Roberto Araujo
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/clkskqykgvag3obxubsceywpia" style="color: black;">2015 XXXIII Brazilian Symposium on Computer Networks and Distributed Systems</a> </i> &nbsp;
This paper proposes a solution to this problem through a hierarchical authorization system.  ...  Increasingly, service providers need to control the access to their resources by users from the federation as, even though the user is authenticated by the federation, its access to resources cannot be  ...  The FACS (Federated Access Control System) provides a hierarchical privilege management solution, where access control policies definitions are delegated to IdP administrators, which can then define whose  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sbrc.2015.32">doi:10.1109/sbrc.2015.32</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sbrc/DinizFMSA15.html">dblp:conf/sbrc/DinizFMSA15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ekocycjsfzc3tgy4arh34c3x6e">fatcat:ekocycjsfzc3tgy4arh34c3x6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200507044015/http://shura.shu.ac.uk/25233/1/SBRC2015-main-IEEE.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c4/6d/c46dec6f058d2ec888c291447c75438bdbe67644.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/sbrc.2015.32"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Software-defined networking (SDN): a survey

Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki Elbelrhiti Elalaoui
<span title="">2016</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
The emergence of the software-defined networking (SDN) paradigm is one of these adopted concepts in the cloud model so as to eliminate the network infrastructure maintenance processes and guarantee easy  ...  In this paper, our purpose is to shed light on SDN related issues and give insight into the challenges facing the future of this revolutionary network model, from both protocol and architecture perspectives  ...  AuthFlow is based on a RADIUS Strengthening the network security IN/EX AC/ CT/DT [170] authentication system where an on the basis of authentication and ST PS SB authenticator handles authentication access  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/sec.1737">doi:10.1002/sec.1737</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/emyctovhxfdm3cxio3itfynpdq">fatcat:emyctovhxfdm3cxio3itfynpdq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190724155640/https://onlinelibrary.wiley.com/doi/pdf/10.1002/sec.1737" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0f/a7/0fa7781735561a8c32250d9eaa9f9f28649986e1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/sec.1737"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> wiley.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 21,815 results