Secure collaboration in a mediator-free distributed environment

M Shehab, A Ghafoor, E Bertino - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
The Internet and related technologies have made multidomain collaborations a reality.
Collaboration enables domains to effectively share resources; however it introduces several …

[PDF][PDF] Amuse: Autonomic management of ubiquitous e-health systems

N Dulay, S Heeps, E Lupu, R Mathur… - … of the UK e-Science Al …, 2005 - doc.ic.ac.uk
Future e-Health systems will consist of low-power on-body wireless sensors attached to
mobile users that interact with a ubiquitous computing environment. This kind of system …

Enhancing role-based trust management with a reputation system for MANETs

R Akbani, T Korkmaz - EURASIP Journal on Wireless Communications …, 2011 - Springer
We start with role-based trust management (RBTM) and address some of the challenges
associated with using RBTM in mobile ad hoc networks (MANETs). We then enhance RBTM …

A role-based infrastructure for the management of dynamic communities

A Schaeffer-Filho, E Lupu, M Sloman, SL Keoh… - Resilient Networks and …, 2008 - Springer
This paper defines an operational framework for specifying and establishing secure
collaborations between autonomous entities that need to interact and depend on each other …

Aspects of trusted and secure business-oriented vo management in service oriented architectures

A Svirskas, MD Wilson, AE Arenas… - … Conference on E …, 2005 - ieeexplore.ieee.org
Virtual enterprises or organisations (VO) have been the focus of research for over a decade.
Although proprietary implementations of VO management tools exist, secure tools based on …

A policy-based management architecture for mobile collaborative teams

E Asmare, A Gopalan, M Sloman… - 2009 IEEE …, 2009 - ieeexplore.ieee.org
Many missions are deemed dangerous or impractical to perform by humans, but can use
collaborating, self-managing unmanned autonomous vehicles (UAVs) which adapt their …

Trusted application-centric ad-hoc networks

G Xu, C Borcea, L Iftode - 2007 IEEE International Conference …, 2007 - ieeexplore.ieee.org
Nodes in MANETs lack the protection offered by firewalls in infrastructure-based networks
because malicious nodes can roam into the vicinity of another node and start launching …

Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad-hoc environment

AA Bakar, R Ismail, AR Ahmad… - … Conference on Digital …, 2009 - ieeexplore.ieee.org
Mobile ad-hoc network is a network that can dynamically setup on the fly by mobile nodes.
Due to its unique characteristics, it is becoming an attractive choice for commercial and also …

An efficient access control model for mobile ad-hoc communities

SL Keoh, E Lupu - International Conference on Security in Pervasive …, 2005 - Springer
Mobile ad-hoc networks support interactions and collaborations among autonomous
devices by enabling users to share resources and provide services to each other, whether …

Security protocols for mobile ad hoc networks

CR Davis - 2006 - escholarship.mcgill.ca
Mobile ad hoc networks (MANETs) are generating much interest both in academia and the
telecommunication industries. The principal attractions of MANETs are related to the ease …