Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Introduction to Cryptography
Context-Based Secure Resource Access in Pervasive Computing Environments
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Context-Based Access Control for Ubiquitous Service Provisioning
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Dynamic Role and Context-Based Access Control for Grid Applications
PDCAT '05 Proceedings of the Sixth International Conference on Parallel and Distributed Computing Applications and Technologies
Role-based access management for ad-hoc collaborative sharing
Proceedings of the eleventh ACM symposium on Access control models and technologies
An Anonymous Context Aware Access Control Architecture For Ubiquitous Services
MDM '06 Proceedings of the 7th International Conference on Mobile Data Management
Cryptography: An Introduction
A Context-Aware Access Control Model for Pervasive Computing Environments
IPC '07 Proceedings of the The 2007 International Conference on Intelligent Pervasive Computing
Context-Role based access control for context-aware application
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Hi-index | 0.00 |
In disaster area, where the infrastructures is partially or fully destroyed, a form of communication to allow information been shared among rescue team is needed. Since Mobile ad-hoc network is easy to setup and required less infrastructure therefore it is a suitable candidate to work in disaster area. Despite of its uniqueness, this network is highly vulnerable to malicious node and also to threats. In rescue mission scenario, information needs to be shared among trusted and legal nodes only hence a mechanism to restrict an access to information in this network is extremely important. In this paper, we outline the access control requirement for this network and proposed the secure access control architecture based on the requirements. Based on the proposed architecture, we derive a Group Based access control scheme, to show how an access to information in mobile ad-hoc environment at emergency rescue mission is working.