Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 198580, 8 pages
http://dx.doi.org/10.1155/2014/198580
Research Article

An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing

1Department of Multimedia Engineering, Dongguk University, Seoul 100-715, Republic of Korea
2Department of Computer Science and Engineering, Seoul National University of Science and Technology, Seoul 139-743, Republic of Korea
3Department of Computer Engineering, Sun Moon University, Asan 330-150, Republic of Korea
4Department of Multimedia Engineering, Dankook University, Cheonan 330-714, Republic of Korea

Received 14 October 2013; Accepted 4 January 2014; Published 23 March 2014

Academic Editor: Jianhua Ma

Copyright © 2014 Young-Sik Jeong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. Chen, H. Yao, and Z. Wang, “An intelligent WLAN intrusion prevention system based on signature detection and plan recognition,” in Proceedings of the 2nd International Conference on Future Networks (ICFN '10), pp. 168–172, January 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. E. Georgakakis, S. A. Nikolidakis, D. D. Vergados, and C. Douligeris, “Spatio temporal emergency role based access control (STEM-RBAC): a time and location aware role based access control model with a break the glass mechanism,” in Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11), pp. 764–770, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Computer role-based access control models,” IEEE Computer Society, vol. 29, no. 2, pp. 38–47, 1996. View at Publisher · View at Google Scholar · View at Scopus
  4. X. Zhou, Y. Ge, X. Chen, Y. Jing, and W. Sun, “A distributed cache based reliable service execution and recovery approach in MANETs,” Journal of ConvergenceNo, vol. 3, no. 1, pp. 5–12, 2012. View at Google Scholar
  5. A. U. Bandaranayake, V. Pandit, and D. P. Agrawal, “Indoor link quality comparison of IEEE 802. 11a channels in a multi-radio Mesh network testbed,” Journal of Information Processing Systems, vol. 8, no. 1, pp. 1–20, 2012. View at Google Scholar
  6. M. Nyanchama and S. Osborn, “The role graph model and conflict of interest,” ACM Transactions on Information and System Security, vol. 2, no. 1, pp. 3–33, 1999. View at Google Scholar
  7. S. Silas, K. Ezra, and E. B. Rajsingh, “A novel fault tolerant service selection framework for pervasive computing,” Human-Centric Computing and Information Sciences, vol. 2, no. 5, pp. 1–14, 2012. View at Google Scholar
  8. M. S. Kirkpatrick, G. Ghinita, and E. Bertino, “Privacy-preserving enforcement of spatially aware RBAC,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 5, pp. 627–640, 2012. View at Google Scholar
  9. J. Timofte, “Wireless intrusion prevention system,” Revista Informatica Economica, vol. 47, pp. 129–132, 2008. View at Google Scholar
  10. Y. Zhang, G. Chen, W. Weng, and Z. Wang, “An overview of wireless intrusion prevention systems,” in Proceedings of the 2nd International Conference on Communication Systems, Networks and Applications (ICCSNA '10), pp. 147–150, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. W. Hsieh, C. Lo, J. Lee, and L. Huang, “The implementation of a proactive wireless intrusion detection system,” in Proceedings of the 4th International Conference on Computer and Information Technology (CIT '04), pp. 581–586, IEEE Press, September 2004. View at Scopus
  12. M. N. Tahir, “C-RBAC: contextual role-based access control model,” Ubiquitous Computing and Communication Journal, vol. 2, no. 3, pp. 67–74, 2007. View at Google Scholar
  13. D. Lijun, Y. Shengsheng, X. Tao, and L. Rongtao, “WBIPS: a lightweight WTLS-based intrusion prevention scheme,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2298–2301, IEEE Press, September 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Vartak, S. Ahmad, and K. N. Gopinath, “An experimental evaluation of Over-The-Air (OTA) wireless intrusion prevention techniques,” in Proceedings of the 2nd International Conference on Communication Systems Software and Middleware, pp. 1–7, IEEE Computer Society, January 2007. View at Publisher · View at Google Scholar · View at Scopus
  15. G. Chen, H. Yao, and Z. Wang, “Research of wireless intrusion prevention systems based on plan recognition and honeypot,” in Proceedings of the International Conference on Wireless Communications and Signal Processing (WCSP '09), pp. 1–5, IEEE Computer Society, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. D. Zou, L. He, H. Jin, and X. Chen, “CRBAC: imposing multi-grained constraints on the RBAC model in the multi-application environment,” Journal of Network and Computer Applications, vol. 32, no. 2, pp. 402–411, 2009. View at Publisher · View at Google Scholar · View at Scopus