Yokoyama et al., 2006 - Google Patents
An anonymous context aware access control architecture for ubiquitous servicesYokoyama et al., 2006
- Document ID
- 1998602083576074261
- Author
- Yokoyama S
- Kamioka E
- Yamada S
- Publication year
- Publication venue
- 7th International Conference on Mobile Data Management (MDM'06)
External Links
Snippet
A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by …
- 239000000725 suspension 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
- H04L29/0602—Protocols characterised by their application
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11595816B2 (en) | System and method to support identity theft protection as part of a distributed service oriented ecosystem | |
Liu et al. | A survey on secure data analytics in edge computing | |
Tang et al. | Iot passport: A blockchain-based trust framework for collaborative internet-of-things | |
Hulsebosch et al. | Context sensitive access control | |
Al-Muhtadi et al. | A lightweight cyber security framework with context-awareness for pervasive computing environments | |
GB2410660A (en) | Flexible delegation | |
Rizzardi et al. | Securing the access control policies to the Internet of Things resources through permissioned blockchain | |
Butkus | A user centric identity management for internet of things | |
US9985974B2 (en) | Securing services and intra-service communications | |
Grande et al. | Edge-centric delegation of authorization for constrained devices in the Internet of Things | |
Beltran et al. | User-centric access control for efficient security in smart cities | |
Thanh et al. | Sip-MBA: a secure IoT platform with brokerless and micro-service architecture | |
Mishra et al. | Access control in IoT networks: analysis and open challenges | |
Beltran et al. | An ARM‐Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT | |
CN101557383A (en) | Professional ability resource management system and professional ability resource use management method | |
Fuentes Carranza et al. | Brokering policies and execution monitors for IoT middleware | |
Bin et al. | Open identity management framework for SaaS ecosystem | |
Yokoyama et al. | An anonymous context aware access control architecture for ubiquitous services | |
Faraji et al. | Identity access management for Multi-tier cloud infrastructures | |
Olsson et al. | 5G zero trust–a zero-trust architecture for telecom | |
US9232078B1 (en) | Method and system for data usage accounting across multiple communication networks | |
Rasori et al. | Using the ACE framework to enforce access and usage control with notifications of revoked access rights | |
Anggorojati et al. | Capability-based access control with ecc key management for the m2m local cloud platform | |
Dehghantanha et al. | User-centered privacy and trust model in cloud computing systems | |
Adireddy et al. | Usercentric federation of access to Internet-of-Things (IoT) devices: a valet key for IoT devices |