A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR

被引:0
作者
Tomur, E. [1 ]
Deregozu, R. [1 ]
Genc, T. [1 ]
机构
[1] Banking Regulat & Supervis Agcy, Ankara, Turkey
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 18 | 2006年 / 18卷
关键词
Remote access; wireless networks; security; virtual private networks; RBAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
  • [31] Secure Shell Remote Access for Virtualized Computing Environment
    Li, He
    Cao, Rongqiang
    Xiu, Hanwen
    Wan, Meng
    Li, Kai
    Wang, Xiaoguang
    Wang, Yangang
    Wang, Jue
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 123 - 132
  • [32] Trust aware cryptographic role based access control scheme for secure cloud data storage
    Dayana, K. Roslin
    Rani, P. Shobha
    AUTOMATIKA, 2023, 64 (04) : 1072 - 1079
  • [33] Tiered Architecture for Remote Access to Data Sources
    Cenci, Karina M.
    de Matteis, Leonardo
    Ardenghi, Jorge R.
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2014, 14 (02): : 67 - 72
  • [34] Secure remote user access over insecure networks
    Peyravian, M
    Jeffries, C
    COMPUTER COMMUNICATIONS, 2006, 29 (05) : 660 - 667
  • [35] CSGW-RAS: A novel secure solution for remote access based on SSL
    Hu, Yada
    Yin, Hao
    Lin, Chuang
    Jiang, Xin
    Ouyang, Ying
    Li, Chao
    2007 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS, VOLS 1 AND 2, 2007, : 822 - +
  • [36] Secure Authentication and Access Mechanism for IoT Wireless Sensors
    Azarmehr, Mahzad
    Ahmadi, Arash
    Rashidzadeh, Rashid
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 774 - 777
  • [37] Role-based access control for vehicular adhoc networks
    Kalinin, Maxim
    Krundyshev, Vasiliy
    Rezedinova, Evgenia
    Zegzhda, Peter
    2018 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2018, : 66 - 70
  • [38] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [39] Managing Constraints in Role Based Access Control
    Blundo, Carlo
    Cimato, Stelvio
    Siniscalchi, Luisa
    IEEE ACCESS, 2020, 8 : 140497 - 140511
  • [40] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88