메뉴 건너뛰기




Volumn 39, Issue 5, 2009, Pages 562-571

Security-Enhanced OSGi service environments

Author keywords

Authorization; OSGi service; Role based management; Security

Indexed keywords

AUTHORIZATION; AUTHORIZATION FRAMEWORKS; CRITICAL ISSUES; HOME NETWORKS; NETWORK DEVICES; NETWORK ENVIRONMENTS; OPEN SERVICES GATEWAY INITIATIVES; OPEN SOURCE IMPLEMENTATION; OSGI FRAMEWORK; OSGI SERVICE; PERSONAL EQUIPMENTS; PROOF OF CONCEPT; ROLE-BASED ACCESS CONTROL; ROLE-BASED MANAGEMENT; SECURITY; SECURITY REQUIREMENTS; SENSITIVE INFORMATIONS; SERVICE ENVIRONMENT;

EID: 69549105973     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2009.2020437     Document Type: Article
Times cited : (16)

References (24)
  • 1
    • 54949083420 scopus 로고    scopus 로고
    • Alliance, Online, Available
    • Digital Living Network Alliance. (2003). [Online]. Available: http:// www.dlna.org/home
    • (2003) Digital Living Network
  • 2
    • 67649719508 scopus 로고    scopus 로고
    • Online, Available
    • Knopflerfish. Knopflerfish Open Source OSGi. (2006). [Online]. Available: http://www.knopflerfish.org/index.html
    • (2006) Knopflerfish Open Source OSGi
  • 3
    • 69549099277 scopus 로고    scopus 로고
    • OSGi Alliance. OSGi Initiative. (1999). [Online]. Available: http://www.osgi.org.
    • OSGi Alliance. OSGi Initiative. (1999). [Online]. Available: http://www.osgi.org.
  • 4
    • 33745905108 scopus 로고    scopus 로고
    • Online, Available
    • Sun Microsystems, Inc. Sun's XACML implementation. (2004). [Online]. Available: http://sunxacml.sourceforge.net/
    • (2004) Sun's XACML implementation
  • 6
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Nov
    • G.-J. Ahn and R. S. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Security, vol. 3, no. 4, pp. 207-226, Nov. 2000.
    • (2000) ACM Trans. Inf. Syst. Security , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.S.2
  • 8
    • 34547378576 scopus 로고    scopus 로고
    • Access control policy management framework based on RBAC in OSGi service platform
    • IEEE Computer Society, Washington, DC
    • E.-A. Cho, C.-J. Moon, D.-H. Park, and D.-K. Baik, "Access control policy management framework based on RBAC in OSGi service platform," in Proc. 6th IEEE Int. Conf. Comput. Inf. Technol. (CIT 2006), IEEE Computer Society, Washington, DC, 2006, pp. 161-166.
    • (2006) Proc. 6th IEEE Int. Conf. Comput. Inf. Technol. (CIT 2006) , pp. 161-166
    • Cho, E.-A.1    Moon, C.-J.2    Park, D.-H.3    Baik, D.-K.4
  • 9
    • 34547375389 scopus 로고    scopus 로고
    • An effective policy management framework using RBAC model for service platform based on components
    • IEEE Computer Society, Washington, DC
    • E.-A. Cho, C.-J. Moon, D.-H. Park, and D.-K. Baik, "An effective policy management framework using RBAC model for service platform based on components," in Proc. 4th Int. Conf. Softw. Eng. Res., Manage. Appl. (SERA 2006), IEEE Computer Society, Washington, DC, 2006, pp. 281-288.
    • (2006) Proc. 4th Int. Conf. Softw. Eng. Res., Manage. Appl. (SERA 2006) , pp. 281-288
    • Cho, E.-A.1    Moon, C.-J.2    Park, D.-H.3    Baik, D.-K.4
  • 10
    • 0842304770 scopus 로고    scopus 로고
    • Home network security
    • C. M. Ellison, "Home network security," Intel Technol. J., vol. 6, no. 4, pp. 37-48, 2002.
    • (2002) Intel Technol. J , vol.6 , Issue.4 , pp. 37-48
    • Ellison, C.M.1
  • 13
    • 2942646707 scopus 로고    scopus 로고
    • Enabling smart spaces with OSGi
    • Jul.-Sep
    • C. Lee, D. Nordstedt, and S. Helal, "Enabling smart spaces with OSGi," IEEE Pervasive Comput., vol. 2, no. 3, pp. 94-98, Jul.-Sep. 2003.
    • (2003) IEEE Pervasive Comput , vol.2 , Issue.3 , pp. 94-98
    • Lee, C.1    Nordstedt, D.2    Helal, S.3
  • 14
    • 33746696082 scopus 로고    scopus 로고
    • Bundle authentication and authorization using XML security in the OSGi service platform
    • IEEE Computer Society, Washington, DC
    • H.-Y. Lim, Y.-G. Kim, C.-J. Moon, and D.-K. Baik, "Bundle authentication and authorization using XML security in the OSGi service platform," in Proc. 4th Annu. ACIS Int. Conf. Comput. Inf. Sci. (ICIS 2005), IEEE Computer Society, Washington, DC, 2005, pp. 502-507.
    • (2005) Proc. 4th Annu. ACIS Int. Conf. Comput. Inf. Sci. (ICIS 2005) , pp. 502-507
    • Lim, H.-Y.1    Kim, Y.-G.2    Moon, C.-J.3    Baik, D.-K.4
  • 15
    • 84944456655 scopus 로고    scopus 로고
    • The prima system for privilege management, authorization and enforcement in grid environments
    • presented at the, Phoenix, AR
    • M. Lorch, D. B. Adams, D. Kafura, M. S. R. Koneni, A. Rathi, and S. Shah, "The prima system for privilege management, authorization and enforcement in grid environments," presented at the 4th Int. Workshop Grid Comput., Phoenix, AR, 2003.
    • (2003) 4th Int. Workshop Grid Comput
    • Lorch, M.1    Adams, D.B.2    Kafura, D.3    Koneni, M.S.R.4    Rathi, A.5    Shah, S.6
  • 16
    • 69549155767 scopus 로고    scopus 로고
    • OASIS, XACML 2.0 Core: EXtensible Access Control Markup Language (XACML) Version 2.0, 2005, Online, Available
    • OASIS, XACML 2.0 Core: EXtensible Access Control Markup Language (XACML) Version 2.0. (2005). [Online]. Available: http:// docs.oasisopen.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
  • 18
    • 0024013967 scopus 로고
    • The ntree: A two dimension partial order for protection groups
    • May
    • R. Sandhu, "The ntree: A two dimension partial order for protection groups," ACM Trans. Comput. Syst., vol. 6, no. 2, pp. 197-222, May 1988.
    • (1988) ACM Trans. Comput. Syst , vol.6 , Issue.2 , pp. 197-222
    • Sandhu, R.1
  • 19
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control model
    • Feb
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control model," IEEE Comput., vol. 2, no. 29, pp. 38-47, Feb. 1996.
    • (1996) IEEE Comput , vol.2 , Issue.29 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 21
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Nov
    • R. S. Sandhu, "Lattice-based access control models," IEEE Comput. vol. 26, no. 11, pp. 9-19, Nov. 1993.
    • (1993) IEEE Comput , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 22
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sep
    • R. S. Sandhu and P. Samarati, "Access control: Principles and practice," IEEE Commun. Mag., vol. 32, no. 9, pp. 40-48, Sep. 1994.
    • (1994) IEEE Commun. Mag , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 23
    • 33947573569 scopus 로고    scopus 로고
    • Service-oriented smart-home architecture based on OSGi and mobile-agent technology
    • Mar
    • C. Wu, C. Liao, and L. Fu, "Service-oriented smart-home architecture based on OSGi and mobile-agent technology," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 37, no. 2, pp. 193-205, Mar. 2007.
    • (2007) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev , vol.37 , Issue.2 , pp. 193-205
    • Wu, C.1    Liao, C.2    Fu, L.3
  • 24
    • 43449100926 scopus 로고    scopus 로고
    • Roles in information systems: A survey
    • May
    • H. Zhu and M. Zhou, "Roles in information systems: A survey," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 3, pp. 377-396, May 2008.
    • (2008) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev , vol.38 , Issue.3 , pp. 377-396
    • Zhu, H.1    Zhou, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.