{"title":"Ad-Hoc网络中的自适应上下文感知访问控制策略","authors":"A. Saidane","doi":"10.1109/CONIELECOMP.2007.50","DOIUrl":null,"url":null,"abstract":"This paper describes an adaptive context-aware access control policy for unauthenticated users. In fact, in open environments like ad-hoc networks, it is difficult to define a policy based on authentication at design time since the potential users are unknown and continuously changing. Thus, the policy can only be defined with regards to the managed resources and the security requirements related to these resources.","PeriodicalId":288478,"journal":{"name":"Third International Conference on Autonomic and Autonomous Systems (ICAS'07)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Adaptive Context-Aware Access Control Policy in Ad-Hoc Networks\",\"authors\":\"A. Saidane\",\"doi\":\"10.1109/CONIELECOMP.2007.50\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes an adaptive context-aware access control policy for unauthenticated users. In fact, in open environments like ad-hoc networks, it is difficult to define a policy based on authentication at design time since the potential users are unknown and continuously changing. Thus, the policy can only be defined with regards to the managed resources and the security requirements related to these resources.\",\"PeriodicalId\":288478,\"journal\":{\"name\":\"Third International Conference on Autonomic and Autonomous Systems (ICAS'07)\",\"volume\":\"79 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Third International Conference on Autonomic and Autonomous Systems (ICAS'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CONIELECOMP.2007.50\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Third International Conference on Autonomic and Autonomous Systems (ICAS'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CONIELECOMP.2007.50","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Adaptive Context-Aware Access Control Policy in Ad-Hoc Networks
This paper describes an adaptive context-aware access control policy for unauthenticated users. In fact, in open environments like ad-hoc networks, it is difficult to define a policy based on authentication at design time since the potential users are unknown and continuously changing. Thus, the policy can only be defined with regards to the managed resources and the security requirements related to these resources.