Dominion- An Introductory Concept of Access Control Between Valuable Assets and Mobile Device
نویسندگان
چکیده
At present methods for providing conditional access to restricted resources and applications for permitting personnel, such as military members, government agencies, or first-responders are not available. The conditional access is provided if the user is an authentic user in one of the authorized geographic location and is connected to specific base transceiver stations or base station controllers. In this work we introduce dominions for mobile security, which are designed to provide this conditional access, are adjustable and congenial with mobile cellular systems, and can run even without being connected to a devoted back-end network. The aim of the architecture is to provide users who satisfy specific pre-conditions access to restricted resources and applications to which they otherwise normally would not be granted access. These mobile security dominions not only provide strict security by authenticating the user and the geographic location of the device, but also prevent access to networks or resources outside of authorized areas and restrict unauthorized users. Keywords-Dominion; Access Control; Mobile Device;
منابع مشابه
گزارش یک مورد: ارسال فشار خون و نبض بیمار به پزشک با استفاده از سیستم Global system for Mobile Communications
Background: Hypertension is a common chronic disease with increasing prevalence worldwide. Regular close monitoring of blood pressure is key point of hypertension management. Home monitoring of blood pressure has its own problems such as lack of early access to a physician in case of emergency. In this study we have designed a device that could send the patient’s self-measured blood pre...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملSynergistic Effect of Radiofrequency Electromagnetic Fields of Dental Light Cure Devices and Mobile Phones Accelerating Microleakage of Amalgam Restorations: An in vitro Study
Background: Previous studies have shown that exposure to electromagnetic fields produced by magnetic resonance imaging or mobile phones can lead to increased microleakage of dental amalgam.Objective: The aim of the present study was to investigate the effect of electromagnetic field of a commercial dental light cure device and a common GSM mobile phone on microleakage of amalgam restorations.Ma...
متن کاملImproving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR
Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...
متن کاملUnderstanding the roles of different stakeholders influencing the use of mobile phones to access agricultural information: A Case of Kilolo and Kilosa Districts, Tanzania
The study investigated the roles of different stakeholders influencing the use of mobile phones in accessing agricultural information in Tanzania. While information is becoming an important ingredient in agriculture, farmers in Tanzania suffer the problem of lacking access to agricultural information. Promisingly, mobile phone technology has become the most valued infrastructure which gives peo...
متن کامل