A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks

With the recent progress of Ubiquitous Communications and low-power wireless technology growing demand, the user could use the mobile device at any time, place, alternately via group-based heterogeneous wireless networks (HWNs) to access resources on the networks. Due to the demands of mobile device not only time-saving but also low power consumption, without too many forces in registering operations during accessing multiple network servers, it should support soft privileges of the original service contract and the flexibility access all desired communication groups in HWNs. However, the traditional access control technologies and schemes are insufficient to cope with such applications that allow the crossing and continuous services in Group-Based HWNs. It not takes into account the safety and efficiency for the majority of communication groups in HWNs, which deals with the conduct collaborative co-operations, such as resource sharing or joint operations. Therefore, the innovative research and design for the key technologies of continuous RBAC using negotiation virtual role solution in Group-Based HWNs is proposed in this paper.

[1]  Chien-Erh Weng,et al.  Cognitive RBAC in mobile heterogeneous networks , 2013, Comput. Sci. Inf. Syst..

[2]  Yuan Gao,et al.  Heterogeneous network selection using a novel multi- attribute decision method , 2008, 2008 Third International Conference on Communications and Networking in China.

[3]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[4]  Shiuh-Jeng Wang,et al.  Temporal and Location-Based RBAC Model , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[5]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[6]  Jiandong Li,et al.  Adaptive Cross-Network Cross-Layer Design in Heterogeneous Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[7]  Hsing-Chung Chen,et al.  Contract RBAC in cloud computing , 2013, The Journal of Supercomputing.

[8]  Guillermo Navarro-Arribas,et al.  Intra-role Progression in RBAC: An RPG-Like Access Control Scheme , 2011, DPM/SETOP.

[9]  Bing He,et al.  On secure communication in integrated heterogeneous wireless networks , 2010, Int. J. Inf. Technol. Commun. Convergence.

[10]  Hsing-Chung Chen,et al.  TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks , 2017, IEEE Systems Journal.

[11]  Hsing-Chung Chen,et al.  A mobile location-based with time-constraint RBAC associated database management model , 2012, Comput. Syst. Sci. Eng..

[12]  Hsing-Chung Chen,et al.  A cognitive RBAC model with handover functions in small heterogeneous networks , 2013, Math. Comput. Model..