[go: up one dir, main page]

Yokoyama et al., 2006 - Google Patents

An anonymous context aware access control architecture for ubiquitous services

Yokoyama et al., 2006

Document ID
1998602083576074261
Author
Yokoyama S
Kamioka E
Yamada S
Publication year
Publication venue
7th International Conference on Mobile Data Management (MDM'06)

External Links

Snippet

A new context aware access control architecture called Anonymous Context Aware Access Control Architecture (ACA2) is proposed. The basic idea of this architecture is based on an analogy to the public telephone service. Anonymous users can use services supported by …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • H04L29/0602Protocols characterised by their application

Similar Documents

Publication Publication Date Title
US11595816B2 (en) System and method to support identity theft protection as part of a distributed service oriented ecosystem
Liu et al. A survey on secure data analytics in edge computing
Tang et al. Iot passport: A blockchain-based trust framework for collaborative internet-of-things
Hulsebosch et al. Context sensitive access control
Al-Muhtadi et al. A lightweight cyber security framework with context-awareness for pervasive computing environments
GB2410660A (en) Flexible delegation
Rizzardi et al. Securing the access control policies to the Internet of Things resources through permissioned blockchain
Butkus A user centric identity management for internet of things
US9985974B2 (en) Securing services and intra-service communications
Grande et al. Edge-centric delegation of authorization for constrained devices in the Internet of Things
Beltran et al. User-centric access control for efficient security in smart cities
Thanh et al. Sip-MBA: a secure IoT platform with brokerless and micro-service architecture
Mishra et al. Access control in IoT networks: analysis and open challenges
Beltran et al. An ARM‐Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT
CN101557383A (en) Professional ability resource management system and professional ability resource use management method
Fuentes Carranza et al. Brokering policies and execution monitors for IoT middleware
Bin et al. Open identity management framework for SaaS ecosystem
Yokoyama et al. An anonymous context aware access control architecture for ubiquitous services
Faraji et al. Identity access management for Multi-tier cloud infrastructures
Olsson et al. 5G zero trust–a zero-trust architecture for telecom
US9232078B1 (en) Method and system for data usage accounting across multiple communication networks
Rasori et al. Using the ACE framework to enforce access and usage control with notifications of revoked access rights
Anggorojati et al. Capability-based access control with ecc key management for the m2m local cloud platform
Dehghantanha et al. User-centered privacy and trust model in cloud computing systems
Adireddy et al. Usercentric federation of access to Internet-of-Things (IoT) devices: a valet key for IoT devices