Managing Access Control in the Presence of Physical and Logical Mobility
نویسندگان
چکیده
The emerging mobile computing environment draws new attention to the need for coordination among networked components. The very nature of this environment requires parties to interact even when they have never met before, and subsequent encounters are totally unpredictable. Because mobile networks are often decoupled from any fixed network infrastructure, reliance on centralized servers to authenticate agents and to establish data access policies is impractical. Access control is a key component of security in such systems, and application agents must be able to directly manipulate and examine policies because they need full and flexible control over their data. Starting from this premise, we examine the essential features of general access control policies designed to respond to the specific needs of agent coordination in the presence of logical and physical mobility. A novel construct to support such policies is proposed and evaluated with respect to its impact on mobile applications. We also show some example uses of this access control construct.
منابع مشابه
Managing Access Control in the Presence of Mobility
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for coordination among small, networked components. The very nature of the environment requires devices to interact even when they meet unpredictably. Because these networks are often decoupled from a fixed infrastructure, reliance on centralized servers for authentication and access policies is imp...
متن کاملContext-Sensitive Access Control for Open Mobile Agent Systems
The increased pervasiveness of wireless mobile computing devices draws new attention to the need for coordination among small networked components. The very nature of the environment requires devices to interact opportunistically when resources are available. Such interactions occur unpredictably as mobile agents generally have no advance knowledge of other agents they will encounter over the l...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملDesigning a logical data model of athletes' hospital information management system based on international standards
Background and purpose: Today, hospital care, relying on the health record system, has received more attention than before. Considering the diversity of data in these systems, the design of standard conceptual and logical models by service providers will play an important role in their success. Therefore, this research was conducted with the aim of designing a logical data model of the hospital...
متن کاملDevelopment and Validation of a Tool for Assessing Barriers to Participation in Team Sports for Women with Physical-Mobility Disabilities
Background. Creating proper contexts to maximize sport participation of women with physical-mobility disabilities requires identifying barriers to their participation. It is essential to develop a valid and reliable tool to identify existing barriers. Objectives. The aim of the present study was to develop and validate a questionnaire for assessing barriers to participation in team sports for ...
متن کامل