The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate applications of access control to Wireless Sensor Networks (WSNs). Although access control was well established for traditional computer systems, it has not been studied thoroughly in WSN environments. We briefly provide the WSN specifications and then stress the constraints of the WSNs that would affect the access control implementation. We also provide a literature...
This paper proposes an algorithm to decide on the batch rekeying time for group key management schemes for Internet protocol television (IPTV) systems. Batch rekeying schemes can reduce the effect of membership changes in group key management schemes by collecting and processing several join and leave events at once. Because membership of IPTV systems frequently changes due to the frequent changes...
An important issues in cloud provisioned multi-tenant healthcare systems is the access control, which focuses on the protection of information against unauthorized access. As different tenants including hospitals, clinics, insurance companies, and pharmacies access the system, sensitive information should be provided only to authorized users and tenants. In this paper, we analyze the requirements...
Hierarchical cryptographic key management of access control can be modeled as a partially ordered set in which a high security class can derive its descendant encryption keys, but not vice versa. In this paper, we propose a practical key management scheme for our segment-based document which is a novel XML-based document format for web publishing, called CEBX. The proposed scheme is not only efficient...
We witness an ongoing intensive research towards the specification and implementation of autonomic behaviors for the Future Internet. Important issues that need to be addressed in that context are related to diverse security aspects of the emerging autonomic network technologies. In this paper, we present our research on security in autonomic networks based on the GANA reference model. We present...
This paper describes how mobility and security services are provided together in a vehicular scenario based on WiMAX technology. MIPv6 and IKEv2 protocols have been chosen for this purpose, in particular the “Mip6d” and “OpenIKEv2” implementations respectively. But this cooperation is performed in a different way as usual, because they also implement an access control mechanism for visited networks...
Connected and interoperable healthcare system promises to reduce the cost of healthcare delivery, increase its efficiency and enable consumers to better engage with clinicians and manage their care. However at the same time it introduces new risks towards security and privacy of personal health information, which are considered to be prominent impediments towards the realization of full benefits of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.