Using Multi-Level Role Based Access Control for W ireless Classified Environments

Wireless environments have been researched considerably over many years. Initially, such applications involve the use of radios but have later evolved into satellites, cellular phones and global positioning systems. One detail involving wireless environments is the need to have them restricted only to those who have a need to use a wireless environment. Such users would have a role with permissions needed to access the system. One example of a user in this type of environment could be a commander on a battlefield requesting real-time information on enemy movements operating in a foreign country. This paper discusses the potential of a multi-level role-based access control (RBAC) in a wireless classified environment. Areas covered include what RBAC is, how RBAC works in a wireless network, how RBAC works with wireless applications, as well as multi-level RBAC application examples. This would show that multi-level RBAC would be suitable for use in a wireless classified environment. Our analysis shows that a Multi-Role Based Access Control can be used along with XML to implement an object-oriented approach to provide security for a wireless classified environment.

[1]  Yasser Gadallah,et al.  A role-based protocol for secure multicast communications in mobile ad hoc networks , 2010, IWCMC.

[2]  Shuang Liang,et al.  Research on Access Control in Collaborative Process Planning System , 2008, 2008 Second International Symposium on Intelligent Information Technology Application.

[3]  Wei Peng,et al.  Multi-level access control for collaborative CAD , 2005, Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005..

[4]  Marcelo Masera,et al.  A context-related authorization and access control method based on RBAC: , 2002, SACMAT '02.

[5]  Q.A. Memon,et al.  XML Implementation of Role Based Control in Healthcare Adhoc Networks , 2007, 2007 International Symposium on Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications.

[6]  Min Chen,et al.  MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).

[7]  Anju Vyas Print , 2003 .

[8]  Emad Eldin Mohamed,et al.  Securing hierarchical multicast communications using roles , 2009, IWCMC.

[9]  Mustaque Ahamad,et al.  Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[10]  Qing Zhao,et al.  Application Research of the CAN on Role-Based Access Control , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Vladimir A. Oleshchuk,et al.  Spatial role-based access control model for wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[12]  Laurence T. Yang,et al.  An Authentication and Access Control Framework for Group Communication Systems in Grid Environment , 2007, 21st International Conference on Advanced Information Networking and Applications (AINA '07).

[13]  Q.A. Memon Policy Based Data Access in Wireless Adhoc Networks , 2006, 2006 International Conference on Software in Telecommunications and Computer Networks.

[14]  Akmal A. Younis,et al.  An efficient role-based access control mechanism for multicasting environments , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.