Sending messages to mobile users in disconnected ad-hoc wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Security architectures for controlled digital information dissemination
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Human Mobility in MANET Disaster Area Simulation - A Realistic Approach
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Prioritized epidemic routing for opportunistic networks
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking
A system for securing push-based distribution of XML documents
International Journal of Information Security
Modelling mobility in disaster area scenarios
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Approximating Travel Times Using Opportunistic Networking
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
Haggle: seamless networking for mobile applications
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Multihop Ad Hoc Networking: The Reality
IEEE Communications Magazine
Secure cross-domain data sharing architecture for crisis management
Proceedings of the tenth annual ACM workshop on Digital rights management
Anomaly detection and mitigation for disaster area networks
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Exploiting node mobility for coordinating data usage in crisis scenarios
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Hi-index | 0.00 |
We propose a novel version and implementation of the Policy-based Authority Evaluation Scheme (PAES) to protect data disseminated amongst the responders to an emergency situation when no network connectivity is available. In such situations Delay Tolerant Networks (DTN) are used to disseminate the data by exploiting the peers' mobility in the area. However, existing DTN protection models require recipients to be known in advance. In emergency situations the data may instead be received by unknown responders who might need it while carrying out their duties. Existing data dissemination solutions such Enterprise Rights Management (ERM) systems rely on centralized architectures where recipients must contact the authorities that can grant access to data. Such centralized solutions cannot be deployed when connectivity cannot be guaranteed. Our solution combines data protection schemes such as ERM systems with DTNs. The result allows us to implement a distributed policy evaluation procedure for DTNs. Simulations demonstrate that the approach permits recipients to obtain fast access to protected data even when no authority can be contacted. This is particularly important in crisis situations where timely access to data is necessary.