Access and Mobility Policy Control at the Network Edge

Authors

  • Evelina Pencheva Faculty of Telecommunications, Technical University of Sofia, Sofia, Bulgaria
  • Ivaylo Asenov Faculty of Telecommunications, Technical University of Sofia, Sofia, Bulgaria
  • Ivaylo Atanasov Faculty of Telecommunications, Technical University of Sofia, Sofia, Bulgaria
Abstract:

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications may provide intelligence in the vicinity of end users which improves network performance and enhances user experience. In this paper, we propose new mobile edge API to access and control the mobility at the network edge. The application logic for provisioning access and mobility policies may be based on considerations like load level information per radio network slice instance, user location, accumulated usage, local policy, etc. We describe the basic API functionality by typical use cases and provide the respective data model, which represents the resource structure and data types. Some implementation aspects, related to modeling the resource states as seen by a mobile edge application and by the network, are discussed.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Modeling Access Control Policy of a Social Network

Social networks bring together users in a virtual platform and offer them the ability to share -within the Communitypersonal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information), privacy settings are limited and do not respond to all user...

full text

Access Control Policy Management

Wang, Qihua. Ph.D., Purdue University, May 2009. Access Control Policy Management. Major Professor: Ninghui Li. Access control is the traditional center of gravity of computer security [1]. People specify access control policies to control accesses to resources in computer systems. The management of access control policies include policy specification and policy analysis. In this dissertation, ...

full text

Conviviality-Driven Access Control Policy

Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights necessary to perform assigned duties. As a consequence, access control mechanisms are perceived by use...

full text

The OPL Access Control Policy Language

Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use c...

full text

Hiding the Policy in Cryptographic Access Control

Recently, cryptographic access control has received a lot of attention, mainly due to the availability of efficient Attribute-Based Encryption (ABE) schemes. ABE allows to get rid of a trusted reference monitor by enforcing access rules in a cryptographic way. However, ABE has a privacy problem: The access policies are sent in clear along with the ciphertexts. Further generalizing the idea of p...

full text

Network-Centric Access Control

Information leakage via the networks formed by subjects and objects often leads to unpredicted risks in access control decisions, and needs to be quantified and addressed in an explicit manner. This paper presents a novel networkcentric access control paradigm that enhances traditional nodecentric models by explicitly accounting for such network effects in information flows, and yet offering sc...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 11  issue Special Issue

pages  105- 111

publication date 2019-07-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023