2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.117
|View full text |Cite
|
Sign up to set email alerts
|

Package-Role Based Authorization Control Model for Wireless Network Services

Abstract: Authorization and authentication services are the major components protecting integrity and authenticity. Authorization control service provides a mechanism to verify user permission to access services. In wireless networks, not only users may change roles but also services can be added, removed or modified more frequently. Although Role-Based Access Control or RBAC can simplify the management of dynamic users, it does not consider dynamic permissions between roles and services. To allow dynamic permission ass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2012
2012

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Ngo et al . proposed an authorization control model PRBAC based on RBAC to enhance the authorization control for the wireless network services. By combining the WoT with social networks, Guinard et al .…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Ngo et al . proposed an authorization control model PRBAC based on RBAC to enhance the authorization control for the wireless network services. By combining the WoT with social networks, Guinard et al .…”
Section: Related Workmentioning
confidence: 99%
“…To the best of our knowledge, only a couple of solutions have been proposed to perform access control for IoT. Ngo et al [27] proposed an authorization control model PRBAC based on RBAC to enhance the authorization control for the wireless network services. By combining the WoT with social networks, Guinard et al [66] adopt authentication mechanisms existing in social networks to perform access control in the WoT.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation