Rescaling of variables in back propagation learning
Neural Networks
Fundamentals of neural networks: architectures, algorithms, and applications
Fundamentals of neural networks: architectures, algorithms, and applications
Artificial Neural Networks: A Tutorial
Computer - Special issue: neural computing: companion issue to Spring 1996 IEEE Computational Science & Engineering
Role-Based Access Control Models
Computer
A role-based access control model and reference implementation within a corporate intranet
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Security models for web-based applications
Communications of the ACM
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Path set selection in mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
An integrated environment for testing mobile ad-hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Lattice-Based Access Control Models
Computer
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Body, personal, and local ad hoc wireless networks
The handbook of ad hoc wireless networks
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The purpose of an ad-hoc network is to enable interactions among its participants. It is thus important to ensure that these interactions are governed by well-defined policies that define the rules for accessing services and resources in the network. In order to address explicit specification of policies for each activity, an architectural framework is proposed to adapt policy based access control called role based access control (RBAC) model in the MANET environment. We analyze the possible wireless adhoc communication environment with respect to security and propose a layer where routine or dynamic analysis of adopted roles by devices can be formulated. We present analysis of such parameters and show that framework for these parameters within the proposed layer leads to better management during time critical operations of wireless adhoc networks.