Role-Based Access Control Models
Computer
The computer for the 21st century
ACM SIGMOBILE Mobile Computing and Communications Review - Special issue dedicated to Mark Weiser
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Personal and Ubiquitous Computing
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
An approach to engineer and enforce context constraints in an RBAC environment
Proceedings of the eighth ACM symposium on Access control models and technologies
Situation awareness in emergency medical dispatch
International Journal of Human-Computer Studies
Methods and limitations of security policy reconciliation
ACM Transactions on Information and System Security (TISSEC)
Authorisation and Conflict Resolution for Hierarchical Domains
POLICY '07 Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
Reconfigurable Systems with a User-Centric Focus
SAINT-W '07 Proceedings of the 2007 International Symposium on Applications and the Internet Workshops
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
User-Centric Identity Management: New Trends in Standardization and Regulation
IEEE Security and Privacy
User centricity: A taxonomy and open issues
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
An Information Model and Architecture for Context-Aware Management Domains
POLICY '08 Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks
Opportunistic overlays: efficient content delivery in mobile ad hoc networks
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets)
WAINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops
Hi-index | 0.00 |
Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. Apart from many remote services, proximity services (context-awareness) are also widely available, and people rely on numerous identities to access these services. The inconvenience of these identities creates significant security vulnerability as well as user discomfort, especially from the network and device point of view in MANet environments. In this article, the authors address how contextual information is represented to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.