메뉴 건너뛰기




Volumn , Issue , 2010, Pages 157-168

An opportunistic authority evaluation scheme for data security in crisis management scenarios

Author keywords

crisis management; Delay Tolerant Networks; encryption; ERM; policies; security

Indexed keywords

CENTRALIZED ARCHITECTURE; CRISIS MANAGEMENT; DATA DISSEMINATION; DATA PROTECTION; DATA SECURITY; DELAY TOLERANT NETWORKS; DISTRIBUTED POLICIES; EMERGENCY SITUATION; ENTERPRISE RIGHTS MANAGEMENT; EVALUATION SCHEME; NETWORK CONNECTIVITY;

EID: 77954496404     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1755688.1755709     Document Type: Conference Paper
Times cited : (15)

References (30)
  • 1
    • 77954504456 scopus 로고    scopus 로고
    • Introduction to encryption key management for public safety radio systems, 2001
    • Accessed December 2009. URL
    • Introduction to encryption key management for public safety radio systems, 2001. Public Safety Wireless Network Program. Security Issues Report: Encryption Key. Accessed December 2009. URL: http://www.safecomprogram.gov/NR/ rdonlyres/7C31664D-5B0B-4128-A85B-DC79B1D734ED/0/Security-Issues-Analysis- Report.pdf.
    • Security Issues Report: Encryption Key
  • 12
    • 34247636066 scopus 로고    scopus 로고
    • Multihop ad hoc networking: The reality
    • April
    • M. Conti and S. Giordano. Multihop ad hoc networking: The reality. IEEE Communications Magazine, 45(4):88-95, April 2007.
    • (2007) IEEE Communications Magazine , vol.45 , Issue.4 , pp. 88-95
    • Conti, M.1    Giordano, S.2
  • 13
    • 77954520609 scopus 로고    scopus 로고
    • Office for Interoperability and Compatibility Department of Homeland Security. Accessed December 2009. URL
    • Office for Interoperability and Compatibility Department of Homeland Security. Public safety statement of requirements for communications & interoperability, 2006. Accessed December 2009. URL: http://www.safecomprogram. gov/SAFECOM/.
    • (2006) Public Safety Statement of Requirements for Communications & Interoperability
  • 16
    • 0034545825 scopus 로고    scopus 로고
    • Sending messages to mobile users in disconnected ad-hoc wireless networks
    • Boston, Massachusetts, USA, August
    • Q. Li and D. Rus. Sending messages to mobile users in disconnected ad-hoc wireless networks. In 6th ACM/IEEE Int. Conf. on Mobile Computing and Networking (MOBICOM), pages 44-55, Boston, Massachusetts, USA, August 2000.
    • (2000) 6th ACM/IEEE Int. Conf. on Mobile Computing and Networking (MOBICOM) , pp. 44-55
    • Li, Q.1    Rus, D.2
  • 17
    • 36348979828 scopus 로고    scopus 로고
    • Opportunistic networks for emergency applications and their standard implementation framework
    • New Orleans, Louisiana, USA, April
    • L. Lilien, A. K. Gupta, and Z. Yang. Opportunistic networks for emergency applications and their standard implementation framework. In 26th IEEE Int. Performance Computing and Communications Conf. (IPCCC), pages 588-593, New Orleans, Louisiana, USA, April 2007.
    • (2007) 26th IEEE Int. Performance Computing and Communications Conf. (IPCCC) , pp. 588-593
    • Lilien, L.1    Gupta, A.K.2    Yang, Z.3
  • 20
    • 84942776290 scopus 로고    scopus 로고
    • Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
    • Prague, Czech Republic, September
    • M. Casassa Mont, S Pearson, and P. Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In 14th Int. Workshop on Database and Expert Systems Applications (DEXA), pages 377-382, Prague, Czech Republic, September 2003.
    • (2003) 14th Int. Workshop on Database and Expert Systems Applications (DEXA) , pp. 377-382
    • Casassa Mont, M.1    Pearson, S.2    Bramhall, P.3
  • 22
    • 84949513306 scopus 로고    scopus 로고
    • Security architectures for controlled digital information dissemination
    • New Orleans, USA, December IEEE Computer Society
    • J. Park, R. S. Sandhu, and J. Schifalacqua. Security architectures for controlled digital information dissemination. In 16th Computer Security Applications Conf. (ACSAC), pages 224-, New Orleans, USA, December 2000. IEEE Computer Society.
    • (2000) 16th Computer Security Applications Conf. (ACSAC) , pp. 224
    • Park, J.1    Sandhu, R.S.2    Schifalacqua, J.3
  • 24
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • 24th Int. Conf. on the Theory and Applications of Cryptographic (EUROCRYPT), Aarhus, Denmark, May Springer
    • A. Sahai and B. Waters. Fuzzy identity-based encryption. In 24th Int. Conf. on the Theory and Applications of Cryptographic (EUROCRYPT), volume 3494 of LNCS, pages 457-473, Aarhus, Denmark, May 2005. Springer.
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 25
    • 70350370034 scopus 로고    scopus 로고
    • Paes: Policy-based authority evaluation scheme
    • Montreal, Quebec, Canada, July
    • E. Scalavino, V. Gowadia, and E. C. Lupu. Paes: Policy-based authority evaluation scheme. In DBSec, pages 268-282, Montreal, Quebec, Canada, July 2009.
    • (2009) DBSec , pp. 268-282
    • Scalavino, E.1    Gowadia, V.2    Lupu, E.C.3
  • 27
    • 77954511537 scopus 로고    scopus 로고
    • Avoco Secure. Accessed December 2009. URL
    • Avoco Secure. Choosing an enterprise rights management system: Architectural approach, 2007. Accessed December 2009. URL:www.windowsecurity. com/uplarticle/Authentication-and-Access-Control/ERM-architectural-approaches. pdf.
    • (2007) Choosing An Enterprise Rights Management System: Architectural Approach


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.