scholarly journals A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment

Author(s):  
Joonseon Ahn ◽  
Byeong-Mo Chang ◽  
Kyung-Goo Doh
2011 ◽  
Vol 55-57 ◽  
pp. 602-607
Author(s):  
Yong Sheng Zhang ◽  
Qin Luo ◽  
Xue Wu Nie ◽  
Xiao Dong Bi

This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web Services. XACML is characterized by the strong ability of expansion and the favorable inter-operation in the access control of the Web Services, which are concluded from the comparison in both SOA strategic architectures. A collection of XACML policy combination algorithms and decision algorithms were discussed in the policy-based service-oriented computing, then the policy control and access control mechanism were also illustrated, and the corresponding decision model was described, at last the development of XACML was prospected.


Author(s):  
Jangha Kim ◽  
Kanghee Lee ◽  
Sangwook Kim ◽  
Jungtaek Seo ◽  
Eunyoung Lee ◽  
...  

2008 ◽  
Vol 2008 ◽  
pp. 1-8 ◽  
Author(s):  
E. Barka ◽  
A. Lakas

The Session Initiation Protocol (SIP) is a signaling protocol used for establishing and maintaining communication sessions involving two or more participants. SIP was initially designed for voice over IP and multimedia conferencing, and then was extended to support other services such as instant messaging and presence management. Today, SIP is also adopted to be used with 3G wireless networks, thus it becomes an integral protocol for ubiquitous environment. SIP has various methods that support a variety of applications such as subscribing to a service, notification of an event, status update, and location and presence services. However, when it comes to security, the use of wireless and mobile communication technologies and the pervasive nature of this environment introduce higher risks to security than that of the old simple environment. In this paper, we introduce new architecture that implements a new type of access control called usage access control (UCON) to control the access to the SIP-based communication at preconnection, during connection, and postconnection. This will enable prescribers of SIP services to control who can identify their locations to approve or disapprove their subsequent connections, and to also set some parameters to determine whether a certain communication can continue or should terminate.


Author(s):  
Kyu-il Kim ◽  
Hyun-Sik Hwang ◽  
Hyuk-Jin Ko ◽  
Hae-Kyung Lee ◽  
Ung-mo Kim

2013 ◽  
Vol 765-767 ◽  
pp. 1739-1742
Author(s):  
Wei Zhao ◽  
Chun He Xia ◽  
Yang Luo ◽  
Xiao Chen Liu ◽  
Wei Kang Wu

Existing defense policy description language can describe some aspects of defense only, such as protection or detection but cannot express relationship among actions. Thus, it cannot accomplish a joint defense goal with the linkage of all kinds of defense mechanism for large-scale, distributed network attacking, such as Botnet. To solve this problem, we proposed a computer network defense-oriented scheme description language (CNDSDL), which can describe protection, detection, analysis, response, and recover actions as well as relationship among actions. These relations include sequence-and, sequence-or, concurrent-and, concurrent-or, and xor. It provides a unified coupling language description for linkage defense of different security devices. At last, we realized the simulation of schemes which are described by CNDSDL. The experiments results show that CNDSDL can be transformed to detailed technique rules and realize the defense effect of expression.


Sign in / Sign up

Export Citation Format

Share Document