Architecture and Protocol for Authorized Transient Control
نویسنده
چکیده
The range of Ubiquitous Computing environments envisioned are characterized as either constantly controlled by a permanent owner, i.e. a privatized environment, or support a general scope of controlling parties as in a public setting. This paper proposes a component architecture and operational protocol for an environment that and transiently changes from the first to the second, based on the validity of a so-called “controllable context”.
منابع مشابه
Transient Change in Core Strength, Endurance, and Upper Limb Isometric Strength after Core Stabilisation Knockdown Protocol in Female Athletes
Objective- We assessed the effect of change in core isometric strength and endurance on upper limb isometric strength in female athletes. Methods- In this experimental study, 32 female athletes aged 18-25 years were recruited based on the inclusion criteria. (17 cases in the experimental group and 15 cases in the control group). Before and after the core stabilization knockdown protocol, parti...
متن کاملAccess control protocols with two-layer architecture for wireless networks
In this paper we study two access control protocols which have similar two-layer access control architectures for wireless networks in public places. The first protocol, called the Lancaster protocol, employs user password for authentication and enforces access control at the IP layer; while the second protocol, referred to as the Stanford protocol, uses public key cryptosystems (PKC) for authe...
متن کاملA Distributed Control Architecture for Autonomous Operation of a Hybrid AC/DC Microgrid System
Hybrid AC/DC microgrids facilitate the procedure of DC power connection into the conventional AC power system by developing the distributed generations (DGs) technologies. The conversion processes between AC and DC electrical powers are more convenient by hybrid systems. In this paper, an energy management system (EMS) for a hybrid microgrid network is proposed due to the optimal utilization of...
متن کاملShibboleth as a Tool for Authorized Access Control to the Subversion Repository System
Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is maintained at their home institution. With Shibboleth, a federation of institutions can share resources among users and yet allow the administration of both the user access control to resources and the user identity and a...
متن کاملNDN-ACE: Access Control for Constrained Environments over Named Data Networking
The access control problem, including authentication and authorization, is critical to the security and privacy of the IoT networks. In this paper we present NDN-ACE, a lightweight access control protocol for constrained environments over Named Data Networking (NDN). NDN-ACE uses symmetric cryptography to authenticate the actuation commands on the constrained devices but offloads the key distri...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004