A Wireless Secure Remote Access Architecture Implementing Role Based Access Control: WiSeR

被引:0
作者
Tomur, E. [1 ]
Deregozu, R. [1 ]
Genc, T. [1 ]
机构
[1] Banking Regulat & Supervis Agcy, Ankara, Turkey
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 18 | 2006年 / 18卷
关键词
Remote access; wireless networks; security; virtual private networks; RBAC;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this study, we propose a network architecture for providing secure access to information resources of enterprise network from remote locations in a wireless fashion. Our proposed architecture offers a very promising solution for organizations which are in need of a secure, flexible and cost-effective remote access methodology. Security of the proposed architecture is based on Virtual Private Network technology and a special role based access control mechanism with location and time constraints. The flexibility mainly comes from the use of Internet as the communication medium and cost-effectiveness is due to the possibility of in-house implementation of the proposed architecture.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 50 条
[41]   Practical Role-Based Access Control [J].
Galante, Victoria .
INFORMATION SECURITY JOURNAL, 2009, 18 (02) :64-73
[42]   Sorting Out Role Based Access Control [J].
Kuijper, Wouter ;
Ermolaev, Victor .
PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, :63-74
[43]   RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control [J].
Wang, Man ;
Mayo, Jean ;
Shene, Ching-Kuang ;
Lake, Thomas ;
Carr, Steve ;
Wang, Chaoli .
ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, :141-146
[44]   Secure and Scalable Remote Access Tunnels for the IIoT: An Assessment of openVPN and IPsec Performance [J].
Pohl, Frederic ;
Schotten, Hans Dieter .
SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2017), 2017, 10465 :83-90
[45]   Improving Security and Mobility for Remote Access: A Wireless Sensor Network Case [J].
Sadio, Ousmane ;
Ngom, Ibrahima ;
Lishou, Claude ;
Saliah-Hassane, Hamadou .
2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2015,
[46]   Efficient and Secure Access Control System Based on Programmable Smart Cards [J].
Malina, Lukas ;
Benes, Vlastimil ;
Hajny, Jan ;
Dzurenda, Petr .
2017 40TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2017, :32-36
[47]   Secure and Privacy Preserving RFID Based Access Control to Smart Buildings [J].
Al-Sudani, Ahmed Raad ;
Gao, Shang ;
Wen, Sheng ;
Al-Khiza'ay, Muhmmad .
SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE (SPACCS 2018), 2018, 11342 :146-155
[48]   A Secure Authentication and Access Control Scheme for CoAP-based IoT [J].
Obaidat, Muath A. ;
Choong, Jian Lim ;
Thakur, Kutub .
2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, :145-149
[49]   Distributed Trust Based Access Control Architecture for Pervasive Computing [J].
Javeed, M. Younas ;
Nawaz, Sidra .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, :464-469
[50]   Distributed Access Control on IoT Ledger-based Architecture [J].
Lunardi, Roben Castagna ;
Michelin, Regio Antonio ;
Neu, Charles Varlei ;
Zorzo, Avelino Francisco .
NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,