CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs

被引:0
作者
Saremi, Fatemeh [1 ]
Mashayekhi, Hoda [1 ]
Movaghar, Ali [1 ]
Jalili, Rasool [1 ]
机构
[1] Sharif Univ Technol, Dept Comp Engn, Tehran, Iran
来源
ADVANCES IN COMPUTER SCIENCE AND ENGINEERING | 2008年 / 6卷
关键词
Cooperation; Group Management; Access Control;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for using services, besides the internal possibly traditional access control model of Service Providers, is governed by the specific threshold-based access control scheme introduced in CEBAC. In addition, a punitive mechanism is applied to mitigate the selfish behavior of authorizers and motivate them to cooperate.
引用
收藏
页码:427 / 434
页数:8
相关论文
共 50 条
  • [31] Toward a decentralized trust-based access control system for dynamic collaboration
    Adams, WJ
    Davis, NJ
    [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 317 - 324
  • [32] Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
    Gay, Richard
    Hu, Jinwei
    Mantel, Heiko
    Mazaheri, Sogol
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 : 18 - 34
  • [33] Semantics-based access control - Ontologies and feasibility study of policy enforcement function
    Naumenko, Anton
    [J]. WEBIST 2007: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL IT: INTERNET TECHNOLOGY, 2007, : 150 - 155
  • [34] Specification & Enforcement of Access Control in Information & Communication Systems
    El Kalam, Anas Abou
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585
  • [35] Access control enforcement in Named Data N etworking
    Hamdane, Balkis
    Serhrouchni, Ahmed
    El Fatmi, Sihem Guemara
    [J]. 2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 576 - +
  • [36] Access Control Enforcement Architectures for Dynamic Manufacturing Systems
    Leander, Bjorn
    Causevic, Aida
    Lindstrom, Tomas
    Hansson, Hans
    [J]. 2023 IEEE 20TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE, ICSA, 2023, : 82 - 92
  • [37] Checking Policy Enforcement in an Access Control Aspect Model
    Song, Eunjee
    France, Robert
    Ray, Indrakshi
    Kim, Hanil
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2008, 11 (05): : 541 - 552
  • [38] Specification and enforcement of access control in heterogeneous distributed applications
    Fink, T
    Koch, M
    Oancea, C
    [J]. WEB SERVICES -ICWS-EUROPE 2003, PROCEEDINGS, 2003, 2853 : 88 - 100
  • [39] Access Control for Database Applications: Beyond Policy Enforcement
    Zhang, Wen
    Panda, Aurojit
    Shenker, Scott
    [J]. PROCEEDINGS OF THE 19TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, HOTOS 2023, 2023, : 223 - 230
  • [40] Policy-based access control framework for grid computing
    Wu, Jin
    Leangsuksun, Chokchai Box
    Rampure, Vishal
    Ong, Hong
    [J]. SIXTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID: SPANNING THE WORLD AND BEYOND, 2006, : 391 - +