The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
RBPIM: A PCIM-Based Framework for RBAC
LCN '03 Proceedings of the 28th Annual IEEE International Conference on Local Computer Networks
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI
Agent Computing and Multi-Agent Systems
Ubiquitous city: Urban technologies, urban infrastructure and urban informatics
Journal of Information Science
Specification and design of advanced authentication and authorization services
Computer Standards & Interfaces
How to secure multi-domain wireless mesh networks
Wireless Networks
Sturdy of security reference model of u-city integrated operating center
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
A dynamic location management scheme for next-generation multitier PCS systems
IEEE Transactions on Wireless Communications
Intelligent ubiquitous IT policy and its industrial services
Journal of Intelligent Manufacturing
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Recently the information and network technologies have been applied to the urban environment. We call this type of a city a ubiquitous-city, or shortly a U-City. Security is an important factor to the success of U-City, by protecting citizen's private date and by preventing malicious attack to the urban facilities. This paper proposes a U-City Integrated Authentication System (UCIAS), which is a unified authentication model installed in a U-City using the ubiquitous role-based access control protocol--the modified version of the original RBAC protocol. The strong point of UCIAS is fast response time, enhanced scalability and reduced workload, which come from the fact that UCIAS rapidly re-authenticates user inter-domain movements without generating a whole dataset again. We built a simple analytic tool to evaluate UCIAS and the results support our assertion.