6,206 Hits in 6.4 sec

Integrating Usage Control with SIP-Based Communications

E. Barka, A. Lakas
2008 Journal of Computer Systems, Networks, and Communications  
The Session Initiation Protocol (SIP) is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants.  ...  In this paper, we introduce new architecture that implements a new type of access control called usage access control (UCON) to control the access to the SIP-based communication at preconnection, during  ...  We have integrated this new concept with 8 Journal of Computer Systems, Networks, and Communications the SIP protocol to produce new architecture that helps in controlling the access to the SIP-based environment  ... 
doi:10.1155/2008/380468 fatcat:zte7sv3b5ndwhead44w243wzse

Vesta: A secure and autonomic system for pervasive healthcare

Yanmin Zhu, Morris Sloman, Emil Lupu, Sye Loong Keoh
2009 Proceedings of the 3d International ICST Conference on Pervasive Computing Technologies for Healthcare  
Finegrained access control of the system is realized through authorization policies. Experimental evaluation shows that it is viable and practical for real-world pervasive healthcare.  ...  This paper describes a body sensor network comprising a personal controller, various biosensors and actuators for pervasive healthcare.  ...  Access control or authorization also becomes a necessity. For example, in a hospital environment, nurses or doctors often need to access resources, or even invoke operations, on a patient's system.  ... 
doi:10.4108/icst.pervasivehealth2009.5939 dblp:conf/ph/ZhuSLK09 fatcat:fqoyfvzvnvenvgsr6ehte32zua

Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments [chapter]

Philip Robinson, Michael Beigl
2004 Lecture Notes in Computer Science  
The issue we have focused on in the broad area of security for Pervasive Computing is maintaining trust in an interactive environment.  ...  Our solution is based on the premise that computers and implicit interaction mechanisms must function in accordance with the explicit parameters of physical human-human interaction.  ...  Following authentication, Covington defines Environment Roles as a methodology for capturing context in authorization and access control models [6] .  ... 
doi:10.1007/978-3-540-39881-3_15 fatcat:aken3po755ee3bukkcfzedfreq

Security in Smart Healthcare System: A Comprehensive Survey

P. Jeyadurga, S. Ebenezer Juliet, I. Joshua Selwyn, P. Sivanisha
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet.  ...  It additionally focuses on the advancement in healthcare systems while deploying IoT services.  ...  Session hijacking is the exploitation of a valid session to gain unauthorized access to the information in a computer system.  ... 
doi:10.23956/ijarcsse.v7i10.423 fatcat:vrystnzhjfaq3ir42k2zo5dug4

Impact assessment of policy expressiveness of an optimised access control model for smart sensors

Mikel Uriarte, Jasone Astorga, Eduardo Jacob, Maider Huarte, Oscar López
2018 IET Information Security  
In this context, this study assesses how the policy length impacts the performance of the establishment of a security association through the protocol named Hidra proposed by such an adapted access control  ...  There is an innovative access control model that conveys an expressive policy language and an optimised codification for tight and flexible access control enforcement in very constrained devices.  ...  In fact, the IoT concept envisions pervasive computing environments where a larger number of people and devices can discover and access services in things around them.  ... 
doi:10.1049/iet-ifs.2018.5204 fatcat:zsgtz443drbphoxwhyoyshdnqq

Enabling Secure Discovery in a Pervasive Environment [chapter]

Slim Trabelsi, Jean-Christophe Pazzaglia, Yves Roudier
2006 Lecture Notes in Computer Science  
Whereas this assumption is at the heart of many pervasive computing protocols and systems, the necessity of securing service discovery and the complexity of this task have been largely underestimated,  ...  The pervasive computing paradigm assumes an essentially dynamic model of interaction between devices that also motivates the need to discover the services offered by previously unknown parties at an early  ...  In pervasive computing, context-awareness would typically be enabled through the access to a set of such services.  ... 
doi:10.1007/11734666_3 fatcat:ecg5tw7zurgv7izwhebkjz7u7i

Services Everywhere: an Object-Oriented Distributed Platform to Support Pervasive Access to HW and SW Objects in Ambient Intelligence Environments [chapter]

Jesus Barba, Felix Jesus, David Villa, Francisco Moya, Fernando Rincon, Maria Jose, Juan Carlos
2010 Ambient Intelligence  
For example when a door is opened or closed, a desktop session in a computer begins, the turning on or turning off of devices, detection of faces, etc.  ...  Services Everywhere: an Object-Oriented Distributed Platform to Support Pervasive Access to HW and SW Objects in Ambient Intelligence Environments 37 .  ...  How to reference In order to correctly reference this scholarly work, feel free to copy and paste the following:  ... 
doi:10.5772/8675 fatcat:ju3ywpifavbkzp6ka3vtaxvyni

Secure policy-based management solutions in heterogeneous embedded systems networks

Konstantinos Rantos, Alexandros Papanikolaou, Konstantinos Fysarakis, Charalampos Manifavas
2012 2012 International Conference on Telecommunications and Multimedia (TEMU)  
Many schemes have been proposed for various types of devices in terms of resources, ranging from the wellstudied policy-based management in computer networks to the more challenging management in sensor  ...  Index Terms-Embedded systems, policy-based management, security, XACML • SAML-integrated XACML messages transferred using the SOAP protocol (over UDP). • SOAP-encapsulated XACML messages protected with  ...  , crucial for next-generation pervasive computing devices, is based on eXtensible Access control Markup Language (XACML) policies.  ... 
doi:10.1109/temu.2012.6294723 dblp:conf/temu/RantosPFM12 fatcat:dtoi6hssybbmbng2t4iiccqphq

Context-aware usage control for web of things

Guangdong Bai, Lin Yan, Liang Gu, Yao Guo, Xiangqun Chen
2012 Security and Communication Networks  
To address these challenges, we propose a context-aware usage control model (ConUCON) , which leverages the context information to enhance data, resource, and service protection for WoT.  ...  On the basis of ConUCON, we also design and implement a context-aware usage control framework on the middleware layer in our ongoing SmartHome project, to provide security and privacy protection.  ...  ACKNOWLEDGEMENTS We are grateful to the guest editor and anonymous reviewers for their valuable comments, suggestions, and effort on this paper.  ... 
doi:10.1002/sec.424 fatcat:rniebajg6zacng3bsp3mrwsw3u

Achieving fine-grained access control in virtual organizations

N. Zhang, L. Yao, A. Nenadic, J. Chin, C. Goble, A. Rector, D. Chadwick, S. Otenko, Q. Shi
2007 Concurrency and Computation  
access control.  ...  The proof-ofconcept prototype is designed and implemented in the Shibboleth and PERMIS infrastructures, which specifies protocols to federate authentication and authorization information and provides a  ...  Thus, both components can be independently integrated. FAME controls access to the HS, PERMIS controls access to the target resource.  ... 
doi:10.1002/cpe.1099 fatcat:5y3somefobeutasux3ln43e66a

Towards Secure Risk-Adaptable Access Control in Cloud Computing

Salasiah Abdullah, Khairul Azmi
2018 International Journal of Advanced Computer Science and Applications  
Moreover, user awareness on the importance of cloud computing has increase the needs to safeguard the cloud by implementing access control that works on dynamic environment.  ...  The emergence of pervasive cloud computing has supported the transition of physical data and machine into virtualization environment.  ...  PDP will user the session key to encrypt p to ̅ to compute kc. Next, ( ) ̅̅̅̅̅̅̅̅̅̅̅̅ generated encapsulated value ̅ to ensure fine-grained access control.  ... 
doi:10.14569/ijacsa.2018.091247 fatcat:wf2roy5emvawlllehniqcdpigm

DRM & Security Enabling Mechanisms Leveraging User Centric Multimedia Convergence [chapter]

Anastasios Fragopoulos, John Gialelis, Dimitrios Serpanos
2012 Cutting Edge Research in New Technologies  
Wireless is being adopted for many new applications: to connect computers, to allow remote monitoring and data acquisition, to provide access control and security, and to provide a solution for environments  ...  Hence, the need for interoperability of heterogeneous networks with hybrid structure is in doubtfully a major requirement, when integrating communication scenarios for indoor and outdoor applications.  ...  Session migration architecture integrated with security and DRM aspects In a typical scenario for pervasive user-centric computing, the backbone architecture must provide to the end user the ability to  ... 
doi:10.5772/34380 fatcat:kqfa5hub5bfebg5uejqww6q4ry

Dynamic configuration of semantic-based service provisioning to portable devices

A. Corradi, R. Montanari, A. Toninelli
2006 International Symposium on Applications and the Internet (SAINT'06)  
Context-awareness is starting to emerge as a key driving principle for the design and provisioning of pervasive services in pervasive computing environments.  ...  needed to access semantic-based services, and that offers a wide set of mechanisms for making viable semantic-based service provisioning to resource-constrained portable devices.  ...  Some initial research ideas are starting to emerge that aim to exploit semantic techniques for service provisioning in pervasive environments [1, 2, 4] .  ... 
doi:10.1109/saint.2006.26 dblp:conf/saint/CorradiMT06 fatcat:ff2dyvxnczgt3kqf6poxmz3hei

An architecture for pervasive healthcare system based on the IP multimedia subsystem and body sensor network

Vanja Miskovic, Djordje Babic
2015 Facta universitatis - series Electronics and Energetics  
This paper also describes usage of the Session Initiation Protocol (SIP) protocol to communicate with the IMS core, whereas data are transmitted within the body of SIP messages.  ...  The possibility of using mobile devices as gateways between sensor networks and IMS has led to the development of integrated solutions such as the one proposed in this paper.  ...  Acknowledgement: This work has been partially supported by the Serbian Ministry of Education and Science under technology development project TR32023 -"Performance Optimization of Energy-efficient Computer  ... 
doi:10.2298/fuee1503439m fatcat:ocl2gtn4n5h6lkyqhsybgx5svi

Information-centric pervasive healthcare platforms

Dirk Trossen, Dana Pavel, Kenneth Guild, Jean Bacon, Jatinder Singh
2010 Proceedings of the 4th International ICST Conference on Pervasive Computing Technologies for Healthcare  
Pervasive health care is gaining attention outside the research community.  ...  We believe that this approach alone can address the various governance and provenance conflicts that emerge in real-life deployments.  ...  Initial work is underway to integrate this work into our environment to fully utilize its potential in our design.  ... 
doi:10.4108/icst.pervasivehealth2010.8768 dblp:conf/ph/TrossenPGBS10 fatcat:3aecokkmxfewriimkosrnovevu
« Previous Showing results 1 — 15 out of 6,206 results