TY - GEN
T1 - A policy-based, secure access control mechanism for network roaming infrastructures
AU - Imai, Tetsuo
AU - Goto, Hideaki
AU - Sone, Hideaki
PY - 2007
Y1 - 2007
N2 - In the Internet society, IP address is treated as information of organization. This is a problem that visitor uses IP address of visited organization because IP address user of visited organization is treated as a member of the organization. For that, the user's access to home resources may be blocked by firewalls because the user's IP address is not home's one. Therefore an application of authentication and access control is needed. The requirements for authentication and access control method are summarized to six items; (1) getting accessibility to the Internet by using a user credential of the home. (2) keeping accessibility to home resources. (3) keeping a local accessibility to visited resources for the visitor. (4) getting enough security along the wireless/wired channel. (5) authenticating a user, and trusting by the result, and assigning an IP address of visited organization. (6) by the authentication information, keeping accessibility to the Internet by using a home IP address. The authors investigate the existing methods and point out the merit and demerit for these requirements. Finally, the authors propose a method named 'Campus Ubiquitous Network.' that fulfill these all requirements.
AB - In the Internet society, IP address is treated as information of organization. This is a problem that visitor uses IP address of visited organization because IP address user of visited organization is treated as a member of the organization. For that, the user's access to home resources may be blocked by firewalls because the user's IP address is not home's one. Therefore an application of authentication and access control is needed. The requirements for authentication and access control method are summarized to six items; (1) getting accessibility to the Internet by using a user credential of the home. (2) keeping accessibility to home resources. (3) keeping a local accessibility to visited resources for the visitor. (4) getting enough security along the wireless/wired channel. (5) authenticating a user, and trusting by the result, and assigning an IP address of visited organization. (6) by the authentication information, keeping accessibility to the Internet by using a home IP address. The authors investigate the existing methods and point out the merit and demerit for these requirements. Finally, the authors propose a method named 'Campus Ubiquitous Network.' that fulfill these all requirements.
UR - http://www.scopus.com/inward/record.url?scp=46349107375&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=46349107375&partnerID=8YFLogxK
U2 - 10.1109/SAINT-W.2007.12
DO - 10.1109/SAINT-W.2007.12
M3 - Conference contribution
AN - SCOPUS:46349107375
SN - 0769527574
SN - 9780769527574
T3 - SAINT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W
SP - 30
BT - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W
PB - IEEE Computer Society
T2 - 2007 International Symposium on Applications and the Internet - Workshops, SAINT-W
Y2 - 15 January 2007 through 19 January 2007
ER -