메뉴 건너뛰기




Volumn 82, Issue 1, 2009, Pages 101-111

A security policy language for wireless sensor networks

Author keywords

Data security; Security policy; Security policy composition; Wireless sensor network

Indexed keywords

COMPUTER SYSTEMS; CRYPTOGRAPHY; HYBRID SENSORS; LINGUISTICS; PUBLIC POLICY; ROUTING PROTOCOLS; SECURITY OF DATA; SECURITY SYSTEMS; SENSOR NETWORKS; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 55249097643     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2008.05.010     Document Type: Article
Times cited : (13)

References (18)
  • 2
    • 55249124933 scopus 로고    scopus 로고
    • Bell, D.E., LaPadula, L.J., 1975. Secure computer systems: unified exposition and multics interpretation. Tech. Rep. MTR-2997, MITRE Corp., Bedford, MA.
    • Bell, D.E., LaPadula, L.J., 1975. Secure computer systems: unified exposition and multics interpretation. Tech. Rep. MTR-2997, MITRE Corp., Bedford, MA.
  • 3
    • 55249110543 scopus 로고    scopus 로고
    • Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing robust user.
    • Benenson, Z., Gedicke, N., Raivio, O., 2005. Realizing robust user.
  • 4
    • 55249103310 scopus 로고    scopus 로고
    • Biba, K.J., 1977. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, MITRE Corp., Bedford, MA.
    • Biba, K.J., 1977. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, MITRE Corp., Bedford, MA.
  • 6
    • 55249092637 scopus 로고    scopus 로고
    • Crossbow, 2007. MICA2 Datasheet. Crossbow Technology Incorporated, 4145 N. First Street, San Jose, CA 95134. .
    • Crossbow, 2007. MICA2 Datasheet. Crossbow Technology Incorporated, 4145 N. First Street, San Jose, CA 95134. .
  • 7
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • Workshop on Policies for Distributed Systems and Networks, Springer-Verlag, Bristol, UK
    • Damianou N., Dulay N., Lupu E., and Sloman M. The ponder policy specification language. Workshop on Policies for Distributed Systems and Networks. LNCS 1995 (2001), Springer-Verlag, Bristol, UK 18-39
    • (2001) LNCS 1995 , pp. 18-39
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 9
    • 38149102619 scopus 로고    scopus 로고
    • Donggang, Liu, 2007. Efficient and distributed access control for sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Santa Fe, NM. pp. 21-35.
    • Donggang, Liu, 2007. Efficient and distributed access control for sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Santa Fe, NM. pp. 21-35.
  • 11
    • 0030677524 scopus 로고    scopus 로고
    • Jajodia, S., Samarati, P., Subrahmanian, V., 1997. A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE, INSPEC Accession Number: 5602909. pp. 31-42.
    • Jajodia, S., Samarati, P., Subrahmanian, V., 1997. A logical language for expressing authorizations. In: Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE, INSPEC Accession Number: 5602909. pp. 31-42.
  • 14
    • 55249124230 scopus 로고    scopus 로고
    • Oliveira, L.B., Aranha, D., Morais, E., Daguano, F., López, J., Dahab, R., 2007. Tinytate: Identity-based encryption for sensor networks. Cryptology ePrint Archive, Report 2007/020.
    • Oliveira, L.B., Aranha, D., Morais, E., Daguano, F., López, J., Dahab, R., 2007. Tinytate: Identity-based encryption for sensor networks. Cryptology ePrint Archive, Report 2007/020.
  • 15
    • 55249096873 scopus 로고    scopus 로고
    • Perrig, A., Canetti, R., Song, D., Tygar, J.D., 2001. Efficient and secure source authentication for multicast. In: Proceedings of the Internet Society Network and Distributed System Security Symposium, NDSS'01. pp. 35-46.
    • Perrig, A., Canetti, R., Song, D., Tygar, J.D., 2001. Efficient and secure source authentication for multicast. In: Proceedings of the Internet Society Network and Distributed System Security Symposium, NDSS'01. pp. 35-46.
  • 16
    • 33746086383 scopus 로고    scopus 로고
    • Wang, H., Li, Q., 2006. Distributed user access control in sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), San Francisco, CA. pp. 305-320.
    • Wang, H., Li, Q., 2006. Distributed user access control in sensor networks. In: Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), San Francisco, CA. pp. 305-320.
  • 18
    • 33750012404 scopus 로고    scopus 로고
    • Access control in wireless sensor networks
    • Zhou Y., Zhang Y., and Fang Y. Access control in wireless sensor networks. Ad Hoc Networks 5 1 (2007) 3-13
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 3-13
    • Zhou, Y.1    Zhang, Y.2    Fang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.