A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR

被引:0
|
作者
Tomur, E. [1 ]
Deregozu, R. [1 ]
Genc, T. [1 ]
机构
[1] Banking Regulat & Supervis Agcy, Ankara, Turkey
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 18 | 2006年 / 18卷
关键词
Remote access; wireless networks; security; virtual private networks; RBAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [1] A Secure Network Architecture for Heterogeneous IoT Devices using Role-based Access Control
    Jaikla, Tinthid
    Vorakulpipat, Chalee
    Rattanalerdnusorn, Ekkachan
    Hoang Dang Hai
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 455 - 459
  • [2] Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare
    Rana, Saurabh
    Mishra, Dheerendra
    JOURNAL OF MEDICAL SYSTEMS, 2020, 44 (05)
  • [3] Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare
    Saurabh Rana
    Dheerendra Mishra
    Journal of Medical Systems, 2020, 44
  • [4] Secure Governance in Enterprise Architecture - Access Control Perspective
    Gaaloul, Khaled
    El Kharbili, Marwane
    Proper, Henderik A.
    2013 3RD INTERNATIONAL SYMPOSIUM ISKO-MAGHREB, 2013,
  • [5] Integration of Role Based Access Control with Homomorphic Cryptosystem for Secure and Controlled Access of Data in Cloud
    Sethi, Kamalakanta
    Chopra, Anish
    Bera, Padmalochan
    Tripathy, Bata Krishna
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 194 - 199
  • [6] Application of temporal and spatial role based access control in 802.11 wireless networks
    Tomur, Emrah
    Erten, Y. M.
    COMPUTERS & SECURITY, 2006, 25 (06) : 452 - 458
  • [7] Secure access to remote server services
    Havranek, Martin
    AGRARIAN PERSPECTIVES XVIII, VOLS 1 AND 2, 2009, : 741 - 744
  • [8] A secure and easy remote access technology
    Enomoto, Nobuyuki
    Yoshimi, Hideo
    Sai, Chinryu
    Hidaka, Youichi
    Takagi, Kazuo
    Iwata, Atsushi
    APSITT 2005: 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, Proceedings, 2005, : 364 - 368
  • [9] Using Multi-Level Role Based Access Control for Wireless Classified Environments
    Burgner, Daniel E.
    Wahsheh, Luay A.
    Ahmad, Aftab
    Graham, Jonathan M.
    Hinds, Cheryl V.
    Williams, Aurelia T.
    DeLoatch, Sandra J.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL II, 2011, : 828 - 832
  • [10] Agent based architecture for secure access from multiple hospitals
    Yoo, Sun K.
    Choe, Jun
    Kim, Do Yoon
    7TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE IN CONJUNCTION WITH 2ND IEEE/ACIS INTERNATIONAL WORKSHOP ON E-ACTIVITY, PROCEEDINGS, 2008, : 255 - +