Enabling Secure Ad hoc Communications in the Enterprise∗
نویسندگان
چکیده
Ad hoc communication applications, such as computer-facilitated collaboration, have become possible with the rapid advancements in portable computing and ad hoc wireless networking. Ad hoc communication solutions require a balance between private communications and access to corporate networked services in order to succeed. In this paper, we discuss and offer some approaches in integrating ad hoc communications into an enterprise framework through the use of secure group services and presence. We believe that the projection of presence and availability are crucial in facilitating spontaneous and ad hoc communication sessions, but argue that the challenges lie in the proper manipulation of user and enterprise policies to allow these sessions to occur in a manner acceptable to the enterprise. We present concepts that focus on the use of presence and group-based policies which we call Presence Associations, that we hope will encourage communications and collaboration among users as well as protect their privacy.
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملSecure Presence-based Services
Ad hoc communication applications like computerfacilitated collaboration have become possible with the rapid advancements in portable computing and ad hoc wireless networking. Ad hoc communication solutions require a balance between private communications and access to corporate networked services in order to succeed. In this paper, we discuss and offer some approaches in integrating ad hoc com...
متن کاملA Framework for Analyzing Virtual Enterprise Infrastructure
We propose that virtual enterprises can be enabled by extending the existing, and evolving, electronic commerce (EC) infrastructure. This incremental approach to virtual enterprises, based on fairly mature technology and standard services, has the obvious advantage over entirely ad hoc solutions of reducing risks and investment costs. To support this view, we present a general multidimensional ...
متن کاملFacilitating Secure Ad hoc Service Discovery in Public Environments
Securely accessing unfamiliar services in public environments using ad hoc wireless networks is challenging. We present a proxy-based approach that uses other existing network channels to set up a secure and trust relationship between communication parties to facilitate ad hoc wireless communications. Based on a service discovery protocol, our models achieve secure, trusted, anonymous, efficien...
متن کاملSecuring Network Services for Wireless Ad Hoc and Sensor Networks
Securing Network Services for Wireless Ad Hoc and Sensor Networks Loukas Lazos Chair of the Supervisory Committee: Professor Radha Poovendran Electrical Engineering Wireless ad hoc and sensor networks are envisioned to be self-organized, self-healing and autonomous networks, deployed when no fixed infrastructure is either feasible or costeffective. However, the sucessful commercialization of su...
متن کامل