메뉴 건너뛰기




Volumn 43 LNICST, Issue , 2010, Pages 249-264

Access control framework for delay/disruption tolerant networks

Author keywords

AAA; Access control; Authentication; Authorization; DTN; Hierarchical; Security

Indexed keywords

AAA; AUTHORIZATION; DTN; HIERARCHICAL; SECURITY;

EID: 80054983998     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-13618-4_18     Document Type: Conference Paper
Times cited : (1)

References (26)
  • 3
    • 13944266651 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged internets
    • August
    • Fall, K.: A Delay-Tolerant Network Architecture for Challenged Internets. SIGCOMM, August 25-29 (2003)
    • (2003) SIGCOMM , pp. 25-29
    • Fall, K.1
  • 4
    • 33947390867 scopus 로고    scopus 로고
    • When TCP breaks: Delay- and disruption-tolerant networking
    • DOI 10.1109/MIC.2006.91
    • Farrell, S., Cahill, V., Geraghty, D., Humphreys, I., McDonald, P.: When TCP Breaks: Delay- and Disruption Tolerant Networking. IEEE Internet Computing 10(4), 72-78 (2006) (Pubitemid 46444996)
    • (2006) IEEE Internet Computing , vol.10 , Issue.4 , pp. 72-78
    • Farrell, S.1    Cahill, V.2    Geraghty, D.3    Humphreys, I.4    McDonald, P.5
  • 5
    • 67650690349 scopus 로고    scopus 로고
    • Bundle protocol specification
    • November
    • Scott, K., Burleigh, S.: Bundle Protocol Specification. IETF RFC 5050 (November 2007)
    • (2007) IETF RFC 5050
    • Scott, K.1    Burleigh, S.2
  • 8
    • 44649172478 scopus 로고    scopus 로고
    • DTN: An architectural retrospective
    • DOI 10.1109/JSAC.2008.080609, 4530739
    • Fall, K., Farrell, S.: DTN: An Architectural Retrospective. IEEE Journal on Selected Areas in Communication (JSAC) 26(5), 828-836 (2008) (Pubitemid 351780200)
    • (2008) IEEE Journal on Selected Areas in Communications , vol.26 , Issue.5 , pp. 828-836
    • Fall, K.1    Farrell, S.2
  • 10
    • 84885885844 scopus 로고    scopus 로고
    • Security requirement for unidirectional lightweight encapsulation (ULE) protocol
    • March
    • Cruickshank, H., Pillai, P., Noisternig, M., Iyengar, S.: Security Requirement for Unidirectional Lightweight Encapsulation (ULE) Protocol. NWG RFC 5458 (March 2009)
    • (2009) NWG RFC 5458
    • Cruickshank, H.1    Pillai, P.2    Noisternig, M.3    Iyengar, S.4
  • 11
    • 71449092160 scopus 로고    scopus 로고
    • Security analysis for delay/disruption tolerant satellite and sensor networks
    • Siena, Italy (September
    • Bhutta, M., Johnson, E., Ansa, G., Ahmed, N., Alsiyabi, M., Cruickshank, H.: Security Analysis for Delay/Disruption Tolerant Satellite and Sensor Networks. In: IWSSC 2009, Siena, Italy (September 2009)
    • (2009) IWSSC 2009
    • Bhutta, M.1    Johnson, E.2    Ansa, G.3    Ahmed, N.4    Alsiyabi, M.5    Cruickshank, H.6
  • 13
    • 34548118365 scopus 로고    scopus 로고
    • Client\server access: Satellite-ATM connectivity using a knowledge management approach
    • DOI 10.1109/ITNG.2007.48, 4151790, Proceedings - International Conference on Information Technology-New Generations, ITNG 2007
    • House, T.C.: Client/Server Access: Satellite-ATM Connectivity Using Knowledge Management Approach. In: 4th International Conference on Information Technology: New Generations, Nevada, pp. 863-867 (2007) (Pubitemid 47298563)
    • (2007) Proceedings - International Conference on Information Technology-New Generations, ITNG 2007 , pp. 863-867
    • House, T.C.1
  • 25
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • DOI 10.1109/2.970591
    • Kagal, L., Finin, T., Joshi, A.: Trust-based Security in Pervasive Computing Environments. IEEE Computer Magazine 34(12), 154-157 (2001) (Pubitemid 33129096)
    • (2001) Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 26
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • Vitek, J. (ed.) Secure Internet Programming. Springer, Heidelberg
    • Blaze, M., Feigenbaum, J., Lacy, J.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185-210. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Lacy, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.