Enabling Secure Ad hoc Communications in the Enterprise∗

نویسندگان

  • A. GHAVAM
  • R. LISCANO
  • M. BARBEAU
چکیده

Ad hoc communication applications, such as computer-facilitated collaboration, have become possible with the rapid advancements in portable computing and ad hoc wireless networking. Ad hoc communication solutions require a balance between private communications and access to corporate networked services in order to succeed. In this paper, we discuss and offer some approaches in integrating ad hoc communications into an enterprise framework through the use of secure group services and presence. We believe that the projection of presence and availability are crucial in facilitating spontaneous and ad hoc communication sessions, but argue that the challenges lie in the proper manipulation of user and enterprise policies to allow these sessions to occur in a manner acceptable to the enterprise. We present concepts that focus on the use of presence and group-based policies which we call Presence Associations, that we hope will encourage communications and collaboration among users as well as protect their privacy.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Secure Presence-based Services

Ad hoc communication applications like computerfacilitated collaboration have become possible with the rapid advancements in portable computing and ad hoc wireless networking. Ad hoc communication solutions require a balance between private communications and access to corporate networked services in order to succeed. In this paper, we discuss and offer some approaches in integrating ad hoc com...

متن کامل

A Framework for Analyzing Virtual Enterprise Infrastructure

We propose that virtual enterprises can be enabled by extending the existing, and evolving, electronic commerce (EC) infrastructure. This incremental approach to virtual enterprises, based on fairly mature technology and standard services, has the obvious advantage over entirely ad hoc solutions of reducing risks and investment costs. To support this view, we present a general multidimensional ...

متن کامل

Facilitating Secure Ad hoc Service Discovery in Public Environments

Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network channels to set up a secure and trust relationship between communication parties to facilitate ad hoc wireless communications. Based on a service discovery protocol, our models achieve secure, trusted, anonymous, efficien...

متن کامل

Securing Network Services for Wireless Ad Hoc and Sensor Networks

Securing Network Services for Wireless Ad Hoc and Sensor Networks Loukas Lazos Chair of the Supervisory Committee: Professor Radha Poovendran Electrical Engineering Wireless ad hoc and sensor networks are envisioned to be self-organized, self-healing and autonomous networks, deployed when no fixed infrastructure is either feasible or costeffective. However, the sucessful commercialization of su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002