{"title":"移动传感器网络中服务访问的语义策略","authors":"Sarfraz Alam, Josef Noll, D. Roman","doi":"10.1109/ICSNC.2008.18","DOIUrl":null,"url":null,"abstract":"This paper addresses issues of service access, and policies to control access to these services. It introduces the mobile phone as a service aggregator and control centre for sensor networks. Semantic policies are used to extend the encryption-based radio link protection by an application layer protection. Two scenarios are introduced, covering home access and content access in the home. The implementation of key elements such as mobile-based key distribution and semantic-based policies are performed in order to show the feasibility of the approach.","PeriodicalId":105399,"journal":{"name":"2008 Third International Conference on Systems and Networks Communications","volume":"R-30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Semantic Policies for Service Access in Mobile Supported Sensor Networks\",\"authors\":\"Sarfraz Alam, Josef Noll, D. Roman\",\"doi\":\"10.1109/ICSNC.2008.18\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper addresses issues of service access, and policies to control access to these services. It introduces the mobile phone as a service aggregator and control centre for sensor networks. Semantic policies are used to extend the encryption-based radio link protection by an application layer protection. Two scenarios are introduced, covering home access and content access in the home. The implementation of key elements such as mobile-based key distribution and semantic-based policies are performed in order to show the feasibility of the approach.\",\"PeriodicalId\":105399,\"journal\":{\"name\":\"2008 Third International Conference on Systems and Networks Communications\",\"volume\":\"R-30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third International Conference on Systems and Networks Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSNC.2008.18\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Systems and Networks Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSNC.2008.18","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Semantic Policies for Service Access in Mobile Supported Sensor Networks
This paper addresses issues of service access, and policies to control access to these services. It introduces the mobile phone as a service aggregator and control centre for sensor networks. Semantic policies are used to extend the encryption-based radio link protection by an application layer protection. Two scenarios are introduced, covering home access and content access in the home. The implementation of key elements such as mobile-based key distribution and semantic-based policies are performed in order to show the feasibility of the approach.