Publication: Group Based Access Control scheme (GBAC): Keeping information sharing secure in mobile ad-hoc environment
dc.citedby | 6 | |
dc.contributor.author | Bakar A.A. | en_US |
dc.contributor.author | Ismail R. | en_US |
dc.contributor.author | Ahmad A.R. | en_US |
dc.contributor.author | Manan J.-L.A. | en_US |
dc.contributor.author | Jais J. | en_US |
dc.contributor.authorid | 35178991300 | en_US |
dc.contributor.authorid | 15839357700 | en_US |
dc.contributor.authorid | 35589598800 | en_US |
dc.contributor.authorid | 35203684100 | en_US |
dc.contributor.authorid | 57212154525 | en_US |
dc.date.accessioned | 2023-12-29T07:52:03Z | |
dc.date.available | 2023-12-29T07:52:03Z | |
dc.date.issued | 2009 | |
dc.description.abstract | Mobile ad-hoc network is a network that can dynamically setup on the fly by mobile nodes. Due to its unique characteristics, it is becoming an attractive choice for commercial and also military application and among the used is to support information sharing among mobile nodes. However due to its borderless infrastructure, this network is highly susceptible to adversaries nodes, that illegally able to access information shared in the network. Hence to overcome this problem we proposed a Group Based Access Control scheme, a step by step process or protocol that able to make an access to share information in the network secure. We use emergency rescue mission scenario to illustrate the use of the scheme. The protocol created meets the security properties such as data confidentiality, integrity and also non-repudiation. � 2009 IEEE. | en_US |
dc.description.nature | Final | en_US |
dc.identifier.ArtNo | 5356797 | |
dc.identifier.doi | 10.1109/ICDIM.2009.5356797 | |
dc.identifier.epage | 90 | |
dc.identifier.scopus | 2-s2.0-76249101586 | |
dc.identifier.spage | 85 | |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-76249101586&doi=10.1109%2fICDIM.2009.5356797&partnerID=40&md5=7d9606578e7807288f104f883d8f20bf | |
dc.identifier.uri | https://irepository.uniten.edu.my/handle/123456789/30731 | |
dc.pagecount | 5 | |
dc.source | Scopus | |
dc.sourcetitle | 4th International Conference on Digital Information Management, ICDIM 2009 | |
dc.subject | Access control | |
dc.subject | Ad hoc networks | |
dc.subject | Information dissemination | |
dc.subject | Information management | |
dc.subject | Information retrieval | |
dc.subject | Mobile ad hoc networks | |
dc.subject | Network security | |
dc.subject | Security systems | |
dc.subject | Access control schemes | |
dc.subject | Ad hoc environment | |
dc.subject | Data confidentiality | |
dc.subject | Emergency rescue | |
dc.subject | Group-based | |
dc.subject | Information shared | |
dc.subject | Information sharing | |
dc.subject | Mobile nodes | |
dc.subject | Non-repudiation | |
dc.subject | On the flies | |
dc.subject | Security properties | |
dc.subject | Step-by-step | |
dc.subject | Network protocols | |
dc.title | Group Based Access Control scheme (GBAC): Keeping information sharing secure in mobile ad-hoc environment | en_US |
dc.type | Conference paper | en_US |
dspace.entity.type | Publication |