Privacy in Distributed Access Control Environment
نویسندگان
چکیده
منابع مشابه
Secure access control in distributed environment
This paper presents the designed concept to improve the public key infrastructure deployability in the mobile adhoc networks routed by B.A.T.M.A.N. Advanced. We have extended the B.A.T.M.A.N. Advanced routing protocol with authentication and authorization of routing updates based on X.509 certificates. Furthermore we have determined several levels of node’s trustworthiness and two levels of int...
متن کاملAccess Control in an Open Distributed Environment
We describe an architecture for secure, independent , interworking services (Oasis). Each service is made responsible for the classiication of its clients into named roles, using a formal logic to specify precise conditions for entering each role. A client becomes authenticated by presenting credentials to a service that enable the service to prove that the client conforms to its policy for ent...
متن کاملPrivacy Preserving Dynamic Access Control Model with Access Delegation for eHealth
eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...
متن کاملDP2AC: Distributed Privacy-Preserving Access Control in Sensor Networks
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect their respective data access patterns whose disclosure may be used against their interests. This paper pr...
متن کاملDPAC: Distributed Privacy-Preserving Access Control in Sensor Networks
The owner and users of a sensor network may be different, which necessitates privacy-preserving access control. On the one hand, the network owner need enforce strict access control so that the sensed data are only accessible to users willing to pay. On the other hand, users wish to protect their respective data access patterns whose disclosure may be used against their interests. This paper pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Technology & Software Engineering
سال: 2018
ISSN: 2165-7866
DOI: 10.4172/2165-7866.1000236