Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005.
DOI: 10.1109/seccmw.2005.1588312
|View full text |Cite
|
Sign up to set email alerts
|

A policy-based approach to wireless LAN security management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
15
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 7 publications
1
15
0
Order By: Relevance
“…Furthermore, [14] pointed out that new technology like Near Field Communication (NFC) which is based on wireless network technologies could be compromised by a hacker through eavesdropping on the network thereby leading to stealing of payment credentials because NFC is usually used for contactless payments. A potential solution to this was [10], who pointed out that the efforts that have been made to combat unauthorized wireless access is mainly focused on outsiders thereby neglecting breaches from insiders of an organization itself and hence, adopted a policy based wireless security management solution to address organizations on how to solve the existing issues.…”
Section: Wireless Network Users and Policiesmentioning
confidence: 99%
“…Furthermore, [14] pointed out that new technology like Near Field Communication (NFC) which is based on wireless network technologies could be compromised by a hacker through eavesdropping on the network thereby leading to stealing of payment credentials because NFC is usually used for contactless payments. A potential solution to this was [10], who pointed out that the efforts that have been made to combat unauthorized wireless access is mainly focused on outsiders thereby neglecting breaches from insiders of an organization itself and hence, adopted a policy based wireless security management solution to address organizations on how to solve the existing issues.…”
Section: Wireless Network Users and Policiesmentioning
confidence: 99%
“…But, the framework considers very simple set of policy constraints. A recent work [2] has been proposed by Lapiotis et al on policy based security management in wireless LAN. They propose a distributed policy based architecture which includes a central policy engine and distributed wireless domain managers with consistent local policy autonomy.…”
Section: Related Workmentioning
confidence: 99%
“…al. [2] has proposed the policybsed management over link layer. This work was extended in our previous work [18].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations